Pepijn VissersUsing Wazuh on a Synology NAS to monitor external VPSes? Yes we can!Wazuh (the Open Source Security Platform) is a free product for security monitoring my VPS. It runs on Synology in Docker.Jul 21
Cayleen GunawanWazuh SIEM Installation & Threat AnalysisGet to know Wazuh, which has comprehensive security capabilities and offers organizations powerful tools for real-time threat detection.Jul 13
Raviteja MureboinaSecurity Logging and Monitoring FailuresIn today’s interconnected digital landscape, where cyber threats and data breaches pose significant risks, the importance of robust logging…Jun 29Jun 29
Ahmed NosirCrafting an Effective Incident Report: A Guide for SOC AnalystsIncident reporting is a critical component in the lifecycle of incident management within a Security Operations Center (SOC). An effective…Feb 4Feb 4
Vijay GuptaCloud Security Monitoring: An In-Depth GuideIn today’s digital era, the adoption of cloud computing has transformed how organizations operate, offering unprecedented scalability…Jun 24Jun 24
Pepijn VissersUsing Wazuh on a Synology NAS to monitor external VPSes? Yes we can!Wazuh (the Open Source Security Platform) is a free product for security monitoring my VPS. It runs on Synology in Docker.Jul 21
Cayleen GunawanWazuh SIEM Installation & Threat AnalysisGet to know Wazuh, which has comprehensive security capabilities and offers organizations powerful tools for real-time threat detection.Jul 13
Raviteja MureboinaSecurity Logging and Monitoring FailuresIn today’s interconnected digital landscape, where cyber threats and data breaches pose significant risks, the importance of robust logging…Jun 29
Ahmed NosirCrafting an Effective Incident Report: A Guide for SOC AnalystsIncident reporting is a critical component in the lifecycle of incident management within a Security Operations Center (SOC). An effective…Feb 4
Vijay GuptaCloud Security Monitoring: An In-Depth GuideIn today’s digital era, the adoption of cloud computing has transformed how organizations operate, offering unprecedented scalability…Jun 24
Rebman K.Lab #3: Blocking SSH Brute-force Attacks with Active Response in WazuhHello and welcome back!! In the previous Lab, we looked at detecting brute force attacks using Wazuh. This post will discuss blocking…Feb 1
Roihan Muhammad IqbalBrute-force SSH Detection Using Wazuh — SIEMA brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, or encryption keys. This method…Jun 19
Florian RothAbout Detection EngineeringIn recent months I’ve noticed several attempts to define the term detection engineering and thought I should share my thoughts on this…Sep 11, 20221