Wazuh and Diamatix Forge Strategic Partnership to Bolster Cybersecurity Solutions
San Jose, California, February 2024 – Wazuh, a global leader in open-source Security Information...
San Jose, California, February 2024 – Wazuh, a global leader in open-source Security Information...
San Jose, California, December 2023. Wazuh is pleased to announce a groundbreaking partnership with Teliko Solutions, a renowned cybersecurity firm specializing in advanced threat detection and response. The collaboration between Wazuh and Teliko Solutions aims to fortify organizations against evolving cyber threats by integrating Wazuh’s robust open-source security platform with Teliko Solution’s cutting-edge threat detection […]
Read moreSan Jose, California, December 2023. Wazuh is pleased to announce a groundbreaking partnership with Teliko Solutions, a renowned cybersecurity firm specializing in advanced threat detection and response. The collaboration between Wazuh and Teliko Solutions aims to fortify organizations against evolving cyber threats by integrating Wazuh’s robust open-source security platform with Teliko Solution’s cutting-edge threat detection […]
Read moreAWS Simple Notification Service (SNS) is a fully managed messaging service that enables sending notifications from the cloud. It supports publishing messages to various endpoints like AWS services, email, SMS, and HTTP/HTTPS webhooks. SNS facilitates application-to-application (A2A) and application-to-person (A2P) communication. This post explores using A2P to publish Wazuh security alerts to SNS topics. The […]
Read moreAWS Simple Notification Service (SNS) is a fully managed messaging service that enables sending notifications from the cloud. It supports publishing messages to various endpoints like AWS services, email, SMS, and HTTP/HTTPS webhooks. SNS facilitates application-to-application (A2A) and application-to-person (A2P) communication. This post explores using A2P to publish Wazuh security alerts to SNS topics. The […]
Read moreSan Jose, California, August 2023. We are glad to announce that ScaryByte has signed a partnership agreement with Wazuh. ScaryByte was created in South Africa in 2020 by a group of passionate and expert cyber security researchers with over 10 years of experience in the field. Their mission is to help the global community prevent […]
Read moreSan Jose, California, August 2023. We are glad to announce that ScaryByte has signed a partnership agreement with Wazuh. ScaryByte was created in South Africa in 2020 by a group of passionate and expert cyber security researchers with over 10 years of experience in the field. Their mission is to help the global community prevent […]
Read moreMonitoring USB drives on a Linux endpoint is essential for maintaining the security and integrity of the system. USB drives can serve as a potential entry point for malware and unauthorized data access. By monitoring these drives, administrators can detect and prevent the introduction of malicious software or unauthorized data transfers. Additionally, monitoring USB drives […]
Read moreMonitoring USB drives on a Linux endpoint is essential for maintaining the security and integrity of the system. USB drives can serve as a potential entry point for malware and unauthorized data access. By monitoring these drives, administrators can detect and prevent the introduction of malicious software or unauthorized data transfers. Additionally, monitoring USB drives […]
Read moreConfiguration management is the process of maintaining computer systems, servers, network devices, and software in a desired and consistent state. Configuration management tools allow you to quickly and remotely control large numbers of different endpoints in an automated way from a centralized location. There are several popular configuration management tools. These include Ansible, Chef, Puppet, […]
Read moreConfiguration management is the process of maintaining computer systems, servers, network devices, and software in a desired and consistent state. Configuration management tools allow you to quickly and remotely control large numbers of different endpoints in an automated way from a centralized location. There are several popular configuration management tools. These include Ansible, Chef, Puppet, […]
Read moreMaltiverse is a threat intelligence platform that collects, analyses, and provides insights into malicious domains, IP addresses, and other digital artifacts commonly associated with cyber threats. It provides a wealth of information on known malicious entities and indicators of compromise (IOCs), making it a valuable resource for cybersecurity professionals. Extensive threat intelligence of Maltiverse complements […]
Read moreMaltiverse is a threat intelligence platform that collects, analyses, and provides insights into malicious domains, IP addresses, and other digital artifacts commonly associated with cyber threats. It provides a wealth of information on known malicious entities and indicators of compromise (IOCs), making it a valuable resource for cybersecurity professionals. Extensive threat intelligence of Maltiverse complements […]
Read moreWe are thrilled to announce the release of Wazuh 4.7.0. This release introduces a native Maltiverse integration and improvements to the Syscollector and Vulnerability Detector modules, among other updates. Below, you can explore some of the new features and improvements of our latest release. Key highlights Maltiverse integration Wazuh 4.7.0 now features native integration with […]
Read moreWe are thrilled to announce the release of Wazuh 4.7.0. This release introduces a native Maltiverse integration and improvements to the Syscollector and Vulnerability Detector modules, among other updates. Below, you can explore some of the new features and improvements of our latest release. Key highlights Maltiverse integration Wazuh 4.7.0 now features native integration with […]
Read moreConducting container vulnerability scans is an approach to protecting containers and the infrastructure that supports them. Containers provide isolated environments for applications, maintaining consistency across other platforms. Detecting and resolving security threats within containers through container vulnerability scanning is an essential proactive security practice. This is important given the dynamic nature of software and the […]
Read moreConducting container vulnerability scans is an approach to protecting containers and the infrastructure that supports them. Containers provide isolated environments for applications, maintaining consistency across other platforms. Detecting and resolving security threats within containers through container vulnerability scanning is an essential proactive security practice. This is important given the dynamic nature of software and the […]
Read moreBlackbit ransomware is a variant of the LokiLocker ransomware. It utilizes sophisticated techniques to encrypt and obstruct data recovery. The ransomware is built on the Ransomware-as-a-service (RaaS) model. RaaS is a subscription-based business model where ransomware groups lease out their infrastructure to ransomware affiliates or cybercriminals to launch cyberattacks. The Blackbit ransomware uses .NET Reactor […]
Read moreBlackbit ransomware is a variant of the LokiLocker ransomware. It utilizes sophisticated techniques to encrypt and obstruct data recovery. The ransomware is built on the Ransomware-as-a-service (RaaS) model. RaaS is a subscription-based business model where ransomware groups lease out their infrastructure to ransomware affiliates or cybercriminals to launch cyberattacks. The Blackbit ransomware uses .NET Reactor […]
Read moreIn this blog post, we combine the capabilities of Cisco Secure Endpoint with the versatility of Wazuh, a unified XDR and SIEM platform. Cisco Secure Endpoint offers cloud-delivered endpoint detection and response. We forward logs from Cisco Secure Endpoint to Wazuh, enabling you to streamline the collection, analysis, and alerting of security logs. We begin […]
Read moreIn this blog post, we combine the capabilities of Cisco Secure Endpoint with the versatility of Wazuh, a unified XDR and SIEM platform. Cisco Secure Endpoint offers cloud-delivered endpoint detection and response. We forward logs from Cisco Secure Endpoint to Wazuh, enabling you to streamline the collection, analysis, and alerting of security logs. We begin […]
Read moreSan Jose, California, October 2023. We are pleased to announce that Wazuh has signed a partnership agreement with Owlh, an open source project to visualize and manage Suricata, Zeek & Arkime life cycles. Owlh offers a scalable solution for network Intrusion Detection Systems (IDS) and seamlessly orchestrates the management of distributed IDS probes across diverse […]
Read moreSan Jose, California, October 2023. We are pleased to announce that Wazuh has signed a partnership agreement with Owlh, an open source project to visualize and manage Suricata, Zeek & Arkime life cycles. Owlh offers a scalable solution for network Intrusion Detection Systems (IDS) and seamlessly orchestrates the management of distributed IDS probes across diverse […]
Read moreWe are excited to announce the release of Wazuh 4.6.0, with new and enhanced capabilities, new use cases, and improved documentation. This marks a significant achievement for our project and greatly benefits our open source community. New features in Wazuh 4.6.0 Wazuh boasts a range of SIEM (Security Information and Event Management) and XDR (Extended […]
Read moreWe are excited to announce the release of Wazuh 4.6.0, with new and enhanced capabilities, new use cases, and improved documentation. This marks a significant achievement for our project and greatly benefits our open source community. New features in Wazuh 4.6.0 Wazuh boasts a range of SIEM (Security Information and Event Management) and XDR (Extended […]
Read moreOSSEC is an open source host-based Intrusion Detection System (IDS) that provides log analysis, integrity monitoring, real-time alerting, and active response capabilities. In recent years, the OSSEC project has been in maintenance mode with limited emphasis on active development. In 2015, the Wazuh team decided to fork the project, expanding upon the OSSEC core functionalities […]
Read moreOSSEC is an open source host-based Intrusion Detection System (IDS) that provides log analysis, integrity monitoring, real-time alerting, and active response capabilities. In recent years, the OSSEC project has been in maintenance mode with limited emphasis on active development. In 2015, the Wazuh team decided to fork the project, expanding upon the OSSEC core functionalities […]
Read more