Monitoring access control violations with Open Policy Agent (OPA) and Wazuh

by anonymouse | Feb 9, 2026 | Engineering, Log Data Analysis, Threat detection, Wazuh

Access control protects the confidentiality, integrity, and availability of systems and data. It is important because attackers frequently exploit legitimate accounts, excessive permissions, and weak policy enforcement to blend into normal operations. While access...

Incident management with Wazuh and Rootly

by anonymouse | Jan 29, 2026 | Engineering, Incident Response, Log Data Analysis, Wazuh

Incident management involves detecting, responding to, and resolving unplanned events efficiently across systems and teams. It is important for organizations aiming to reduce downtime, mitigate risks, and maintain operational resilience. Incident management platforms...

Detecting and responding to Rhadamanthys stealer with Wazuh

by anonymouse | Jan 22, 2026 | Engineering, Malware detection, Threat Hunting, Wazuh

Rhadamanthys Stealer is a credential-harvesting malware sold as Malware-as-a-Service (MaaS). It is known for its modular architecture, data-stealing capabilities, and continuous updates driven by criminal marketplaces. Attackers distribute Rhadamanthys stealer via...

Open source software as the future of cybersecurity 

by anonymouse | Jan 12, 2026 | Engineering, Threat detection, Wazuh

Open source software makes its source code publicly available, allowing anyone to inspect, audit, and improve it. This transparency creates verifiable trust, where security claims can be independently validated by a global community instead of taken on faith. Open...

Detecting and responding to Cephalus ransomware with Wazuh

by anonymouse | Dec 26, 2025 | Engineering, Malware detection, Threat Hunting, Wazuh

Cephalus ransomware surfaced in mid-August 2025 and quickly attracted attention for its stealth and operational precision. The threat actors demonstrate a clear financial motivation and rely on initial access vectors. They exploit weak or exposed Remote Desktop...

Detecting React CVE-2025-55182 RCE vulnerability with Wazuh

by anonymouse | Dec 18, 2025 | Engineering, Vulnerability Detection, Wazuh

A critical severity Remote Code Execution (RCE) vulnerability disclosed as CVE-2025-55182, has been identified affecting the React Server Components (RSC) protocol. This vulnerability is rated CVSS 10.0 and allows unauthenticated attackers to execute arbitrary code on...
« Older Entries

Recent Posts

  • Privacy Policy
  • Cloud Server Legal Notice
  • Significant legal career recognised as John de Groot receives President’s Medal
  • Former Qld Coroner given national role in intelligence realm
  • Former Qld Coroner given national role in intelligence realm

Recent Comments

No comments to show.