Monitoring access control violations with Open Policy Agent (OPA) and Wazuh

by anonymouse | Feb 9, 2026 | Engineering, Log Data Analysis, Threat detection, Wazuh

Access control protects the confidentiality, integrity, and availability of systems and data. It is important because attackers frequently exploit legitimate accounts, excessive permissions, and weak policy enforcement to blend into normal operations. While access...

Open source software as the future of cybersecurity 

by anonymouse | Jan 12, 2026 | Engineering, Threat detection, Wazuh

Open source software makes its source code publicly available, allowing anyone to inspect, audit, and improve it. This transparency creates verifiable trust, where security claims can be independently validated by a global community instead of taken on faith. Open...

Automated password rotation with Wazuh and Shuffle

by anonymouse | Dec 11, 2025 | Engineering, Log Data Analysis, Threat detection, Wazuh

Automated password rotation helps protect both cloud and on-premises environments from unauthorized access and credential compromise by reducing the risk associated with exposed credentials. Suspicious or unrecognized login attempts may indicate stolen credentials,...

Detecting Next.js CVE-2025-66478 RCE vulnerability with Wazuh

by anonymouse | Dec 5, 2025 | Engineering, Regulatory Compliance, Threat detection, Vulnerability Detection, Wazuh

A critical severity Remote Code Execution (RCE) vulnerability affecting Next.js applications that use the App Router has been identified. This vulnerability is rated CVSS 10.0, disclosed as CVE-2025-66478 and allows remote code execution (RCE) when attacker-controlled...

Recent Posts

  • Privacy Policy
  • Cloud Server Legal Notice
  • Significant legal career recognised as John de Groot receives President’s Medal
  • Former Qld Coroner given national role in intelligence realm
  • Former Qld Coroner given national role in intelligence realm

Recent Comments

No comments to show.