??Wazuh Turns 10!?? A decade ago, Wazuh began as an open-source security project with a mission to make cybersecurity accessible to all. Today, thanks to our incredible community, we’ve grown into the leading open-source cybersecurity platform, protecting thousands of organizations worldwide. None of this would be possible without you—our users, contributors, and partners. Your support, feedback, and collaboration continue to drive Wazuh forward. Thank you for being part of our journey! Here’s to the next 10 years of innovation and security. ?? #Wazuh10Years #OpenSourceSecurity #Cybersecurit
Wazuh
计算机和网络安全
Campbell,California 53,938 位关注者
The Open Source Security Platform. Unified XDR and SIEM protection.
关于我们
Wazuh is a free and open-source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh, with over 10 million downloads per year, has one of the largest open-source security communities in the world. Wazuh helps organizations of all sizes protect their data assets against security threats. Learn more about the project at wazuh.com
- 网站
-
https://www.wazuh.com
Wazuh的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 201-500 人
- 总部
- Campbell,California
- 类型
- 私人持股
- 创立
- 2015
- 领域
- Log Management、File Integrity Monitoring、Cyber Security、SIEM、XDR、Open Source、Endpoint Detection and Response、Threat Intelligence、Threat Hunting、Incident Response、Vulnerability Detection、Endpoint Protection、Cloud Security、Malware Prevention和PCI DSS Compliance
地点
-
主要
1999 S Bascom Ave
US,California,Campbell,95008
Wazuh员工
动态
-
Wazuh转发了
Szukasz skutecznych narz?dzi do monitorowania zagro?eń i ochrony sieci OT/IT? ?? Mamy dla Ciebie ?wietn? wiadomo??! Do grona partnerów Network & Security RoadShow by Tekniska do??cza Wazuh, globalny lider w dziedzinie open-source security! ?? Co to dla Ciebie oznacza? ?? Ju? za nieca?e dwa tygodnie, podczas NSR w ?odzi (25-26 marca) b?dziesz mie? wyj?tkow? okazj?, by dowiedzie? si? wi?cej na temat rozwi?zań Wazuh, skonsultowa? konkretne potrzeby Twojej organizacji i dowiedzie? si?, jak w praktyce wykorzysta? ich zaawansowane rozwi?zania SIEM i XDR do monitorowania zagro?eń, analizy zdarzeń i zarz?dzania incydentami. ?piesz si? – liczba miejsc jest ograniczona! ??♂? https://tiny.pl/1rbcj-mw? --- ENG Looking for effective tools to monitor threats and secure your OT/IT networks? ?? We’ve got great news for you! Wazuh, a global leader in open-source security, is joining the Network & Security RoadShow by Tekniska! ?? What does this mean for you? ?? In less than two weeks, during NSR in ?ód? (March 25-26), you’ll have a unique opportunity to learn more about Wazuh's solutions, discuss your organization’s specific needs, and learn how to effectively use their advanced SIEM and XDR solutions for threat monitoring, event analysis, and incident management. Hurry up – spots are limited! ??♂? https://tiny.pl/1rbcj-mw #Tekniska #NSR25 #RoadShow #OT #ICS #cybersecurity #networksecurity #IndustrialNetworking #Otwarriors #everythingconnects #?ód? #Wazuh
-
-
Wazuh转发了
Detecting data exfiltration is an important aspect of maintaining cybersecurity, especially when attackers leverage native system tools to evade detection. Living Off the Land (LOTL) is a technique involving the misuse of legitimate utilities in the operating system, making malicious activities blend with normal operations. This blog post, Detecting data exfiltration using Living Off the Land tools with Wazuh, demonstrates how Wazuh can detect data exfiltration performed using LOTL tools within a Windows environment. Read more: https://bit.ly/4kLekKe #InformationSecurity #Cybersecurity #OpenSource
-
Detecting data exfiltration is an important aspect of maintaining cybersecurity, especially when attackers leverage native system tools to evade detection. Living Off the Land (LOTL) is a technique involving the misuse of legitimate utilities in the operating system, making malicious activities blend with normal operations. This blog post, Detecting data exfiltration using Living Off the Land tools with Wazuh, demonstrates how Wazuh can detect data exfiltration performed using LOTL tools within a Windows environment. Read more: https://bit.ly/4kLekKe #InformationSecurity #Cybersecurity #OpenSource
-
???????????? ?????? ???????????? ???????? ?????????? ?????????????????????? ?? The Wazuh Partners Program offers you the opportunity to enhance your security services by integrating our comprehensive, single-agent platform into your offerings. By partnering with us, you can deliver robust threat prevention, detection, and response solutions to your customers. ?????? ?????????????? ???????? ??????????? - Increase Your Revenue with exclusive discounts on our services - Expand Your Business by integrating our platform to meet a wider range of security needs. - Partnership Plans have access to demo environments, extended cloud trial periods, and pre-sales assistance. Join the Wazuh Partners Program today and take your security services to the next level. ?????????? ????????: https://lnkd.in/dp2pRE6U #CyberSecurity #OpenSource #InformationSecurity
-
-
?? Sign up now for our Wazuh special training course in Spanish! ?? Learn how to take full advantage of the Wazuh open source security platform with our special training course in Spanish. Starting next week! ??Key Wazuh concepts ??Agent deployment and management ??Threat monitoring and detection Don’t miss this opportunity to enhance your cybersecurity skills. Register now! ?? https://lnkd.in/eUHvi7DA #Wazuh #Cybersecurity #Training #Infosec
-
-
Peaklight malware is an information stealer designed to collect sensitive data from compromised endpoints. It is frequently distributed through underground channels and, in some cases, offered as a Malware-as-a-Service (MaaS). Its flexible structure and frequent updates make it a continuously evolving and potent threat, capable of bypassing conventional security measures. Our new blog post, Detecting Peaklight Malware with Wazuh, illustrates how to detect Peaklight malware on infected Windows endpoints using Wazuh. Read more: https://ow.ly/AUSm50VbITx #InformationSecurity #CyberSecurity #OpenSource
-
Thank you to The Hacker News for the article 'Defending against USB drive attacks with Wazuh'. Read more: https://ow.ly/lGBk50Vb0H7 #OpenSource #CyberSecurity #InformationSecurity
-
Vulnerabilities in container images and runtime environments expose organizations to significant risks, which makes proactive vulnerability scanning an essential practice. Trivy is an open-source vulnerability scanner designed for containers, file systems, and software dependencies. Our new blog post, Container Image Security with Wazuh and Trivy, demonstrates how to integrate Trivy with Wazuh to perform effective container image vulnerability scanning. Read more: https://ow.ly/J0SV50V8hKL #InformationSecurity #CyberSecurity #OpenSource
-
Lynx ransomware is a malware that uses double extortion tactics to steal and encrypt data, targeting various industries. Our new blog post shows how to detect Lynx ransomware activities on a monitored Windows endpoint using Wazuh threat detection and response capabilities. Read more: https://ow.ly/CRf350V5ifr #InformationSecurity #CyberSecurity #OpenSource