Blog / Engineering / Auto-scalable Wazuh Cluster with Docker-Compose
To get started using Wazuh, take a look at Wazuh’s official Docker image. Docker Hub and Github can be used to quickly deploy a complete working environment with a Wazuh Manager, Wazuh API, Elasticsearch,...
Blog / Engineering / Monitoring root actions on Linux using Auditd and Wazuh
The Linux Audit system takes care of keeping track of what is happening in the operating system by listening to events based on pre-configured rules. Nevertheless, Audit does not provide...
Blog / Engineering / Benefits of using AES in our communications
Encryption is the conversion of data from a readable format into an encoded format that can only be read or processed after it’s been decrypted. The Advanced Encryption Standard (AES),...
Blog / Releases / Wazuh v3.10.0 released
Hi everyone, the team is pleased to announce the release of Wazuh 3.10.0. This new version comes with lots of additions and improvements. Here are some highlights of the new...
Blog / Releases / Wazuh v3.11 released
Hi everyone, The team is pleased to announce the release of Wazuh v3.11. This new version comes with lots of additions and improvements, so here are some of the release...
Blog / Engineering / Creating decoders and rules from scratch
Wazuh provides an out-of-the-box set of rules used for threat detection and response. This ruleset is continuously updated thanks to the work of our contributors and developers. Moreover, users can...
Blog / News / Wazuh and Teliko Solutions Forge Strategic Partnership to Elevate Cybersecurity Solutions
...Solution, we look forward to delivering innovative, scalable, and effective security solutions to our clients.“ Pablo Rubio, Sales Director at Teliko Solution, added, “Wazuh has proven to be a fast...
A few months ago I wrote a post in the Wazuh blog describing how to monitoring root actions on Linux systems using auditd and Wazuh which had been useful for a lot of users…
ThreatFox is a free platform from abuse.ch with the goal of sharing indicators of compromise (IOCs) associated with malware with the infosec community…