Submitting the form

All results for 'Rolly Davany Mougoue Kakanou'

Showing 4 of 4 results

Wazuh agent groups and centralized configuration

Blog / Engineering / Wazuh agent groups and centralized configuration

Centralized configuration management offers a unified approach for organizing, controlling, and modifying configurations within a large infrastructure. They mitigate the challenges associated with manual configuration management, such as human errors,...

Hunting for Linux credential access attacks with Wazuh

Blog / Engineering / Hunting for Linux credential access attacks with Wazuh

Credential access attacks are cyber attacks that aim to obtain users’ login credentials. These credentials can include usernames, passwords, security tokens, or other authentication information. They remain one of the...

BLX stealer detection and response using Wazuh

Blog / Engineering / BLX stealer detection and response using Wazuh

BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques,...

No results for 'Rolly Davany Mougoue Kakanou'

Please make sure that all words are spelled correctly.