by anonymouse | Feb 9, 2026 | Engineering, Log Data Analysis, Threat detection, Wazuh
Access control protects the confidentiality, integrity, and availability of systems and data. It is important because attackers frequently exploit legitimate accounts, excessive permissions, and weak policy enforcement to blend into normal operations. While access...
by anonymouse | Jan 29, 2026 | Engineering, Incident Response, Log Data Analysis, Wazuh
Incident management involves detecting, responding to, and resolving unplanned events efficiently across systems and teams. It is important for organizations aiming to reduce downtime, mitigate risks, and maintain operational resilience. Incident management platforms...
by anonymouse | Jan 23, 2026 | News, Wazuh
San Jose, California, January 2026 – Wazuh, the leading open-source Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) platform, announced a partnership with Blue Networks, a cybersecurity consulting boutique and managed...
by anonymouse | Jan 22, 2026 | Engineering, Malware detection, Threat Hunting, Wazuh
Rhadamanthys Stealer is a credential-harvesting malware sold as Malware-as-a-Service (MaaS). It is known for its modular architecture, data-stealing capabilities, and continuous updates driven by criminal marketplaces. Attackers distribute Rhadamanthys stealer via...
by anonymouse | Jan 21, 2026 | News, Wazuh
Wazuh architecture is designed to support agentic AI integration through its existing APIs and programmatic interfaces. Julio Casal (Wazuh) recently shared an early preview of this direction, demonstrating how AI agents can interact with Wazuh deployments to automate...
by anonymouse | Jan 15, 2026 | News, Wazuh
The Wazuh Ambassadors program brings together security practitioners who actively support the global Wazuh community. Ambassadors share hands-on knowledge, create educational resources, and help others adopt and maximize the benefits of Wazuh through collaboration and...