Blog / Engineering / Wazuh agent groups and centralized configuration
Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors,...
Blog / Engineering / Hunting for Windows credential access attacks with Wazuh
Credential access attacks have become over time one of the critical security concerns for organizations. This phase of an attack, where adversaries obtain access to sensitive credentials, poses the most...
Blog / Engineering / Hunting for Linux credential access attacks with Wazuh
Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the...
Blog / Engineering / BLX stealer detection and response using Wazuh
BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques,...