Blog / Engineering / Hunting for Linux credential access attacks with Wazuh
Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the...
Blog / Engineering / Integrating Wazuh with Fluentd for unified logging
Wazuh introduced the Fluentd module, which allows the forwarding of information to a Fluentd server. Gain more security visibility on your system today.
Blog / Engineering / Wazuh agent groups and centralized configuration
Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors,...
Blog / Engineering / Hunting for Windows credential access attacks with Wazuh
Credential access attacks have become over time one of the critical security concerns for organizations. This phase of an attack, where adversaries obtain access to sensitive credentials, poses the most...