Wazuh’s cover photo
Wazuh

Wazuh

Computer and Network Security

Campbell, California 67,520 followers

The Open Source Security Platform. Unified XDR and SIEM protection.

About us

Wazuh is a free and open-source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh, with over 10 million downloads per year, has one of the largest open-source security communities in the world. Wazuh helps organizations of all sizes protect their data assets against security threats. Learn more about the project at wazuh.com

Website
https://www.wazuh.com
Industry
Computer and Network Security
Company size
201-500 employees
Headquarters
Campbell, California
Type
Privately Held
Founded
2015
Specialties
Log Management, File Integrity Monitoring, Cyber Security, SIEM, XDR, Open Source, Endpoint Detection and Response, Threat Intelligence, Threat Hunting, Incident Response, Vulnerability Detection, Endpoint Protection, Cloud Security, Malware Prevention, and PCI DSS Compliance

Locations

Employees at Wazuh

Updates

  • Wazuh reposted this

    Wazuh × Tines SOAR Integration: Lab Setup Phase 1 As a Wazuh Ambassador, I'm excited to share my latest lab project: integrating Wazuh (SIEM) with Tines (SOAR) to deliver human-in-the-loop automation threat detection and response. Tines Integration perfect for: - Learners building homelabs with limited VM resources (Need Saas SOAR) - Teams wanting to test SOAR capabilities without infrastructure investment - Organizations seeking SOAR Saas solution Phase 1 : Wazuh → Tines (Detection & Enrichment) - Wazuh Server Detects a security alert (e.g., brute-force attempt) - Tines SOAR - Receives alert JSON from wazuh through a secure webhook   - Enrich & Log - Performs AbuseIPDB lookup - Generates AI-based context summary - Sends an email report to the analyst - Logs every alert to Google Sheets for tracking - Decision Point - If Abuse Confidence ≥ 80%, Tines automatically triggers an Active Response (IP block). - If Abuse Confidence < 80%, the analyst must reply to the email to confirm whether to take action. 💬 (Around 80% of alerts engage security analysts for informed decision-making, combining automated enrichment with human intelligence for optimal outcomes.) - Send Active Response When confirmed, Tines triggers an IP block back in Wazuh, fully logged and auditable. ⚙️ Phase 2 : Tines → Wazuh (Response & Action) Coming soon... Phase 2 detailing on the response automation layer: how Tines sends blocking commands to Wazuh through a webhook receiver with complete action logging viewable in the Wazuh dashboard. 📚 Documentation now available on Medium https://lnkd.in/g8DjXJJG

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +1
  • Wazuh reposted this

    View profile for Muhammad Akmalul Hakim S.

    Senior Network Security Engineer | Wazuh Ambassador | SOC & Blue Teaming Enthusiast

    🔍 What I Love Most About Wazuh? It’s All About the MITRE ATT&CK Framework. 🔍 As a security professional, raw log data is just noise. The real magic happens when you can translate those signals into a clear story of an attacker's playbook. That’s exactly what Wazuh’s MITRE ATT&CK mapping does, and it’s a game-changer. Looking at our dashboard, we don't just see "alerts"; we see a strategic narrative: ➡️ The Story Unfolds in Real-Time: The attack lifecycle is visualized right in front of us. We can see adversaries moving from Reconnaissance (T1595.002 - Vulnerability Scanning) straight into attempts at Initial Access (T1189 - Exploit Public-Facing Application). This isn't just data—it's the kill chain in action. 🎯 From Generic to Specific in Seconds: Instead of sifting through thousands of generic "HTTP Error" logs, the dashboard immediately highlights the specific techniques in use. We can instantly see top threats like: T1059.007 - JavaScript (malicious scripts in web attacks) T1055 - Process Injection (advanced evasion attempts) T1078 - Valid Accounts (abuse of legitimate credentials) This context is priceless for prioritizing our response. 📊 Strategic Visibility for Proactive Defense: By categorizing alerts into tactical buckets like Execution, Defense Evasion, and Persistence, Wazuh answers the most critical question: "What is the attacker trying to do now?" This allows us to shift from a reactive posture to a proactive, intelligence-driven defense. For any security team aiming to mature their threat detection and response capabilities, the deep integration of MITRE ATT&CK in Wazuh isn't just a feature—it's a force multiplier. #Wazuh #MITREATTACK #Cybersecurity #SOC #ThreatDetection #SIEM #InfoSec #CyberDefense

    • No alternative text description for this image
    • No alternative text description for this image
  • Wazuh reposted this

    View profile for 🛡️Michał Bednarczyk

    Cyber Security Analyst at Tekniska | CCDA | BTL1 🥇 | PSAA | SAL1 | C3SA | CSIL-CI | Blue Team | SIEM Engineer | Wazuh Certified | Wazuh Ambassador

    I am very pleased to announce that, as one of the Wazuh #Ambassadors, I have created my fourth publication. ✅ This time, I have discussed step by step how to update Wazuh to a newer version. ⚙️ I hope you will find this publication useful. Of course, I welcome any comments and feedback. I would like to remind you that the latest version of Wazuh, 4.14.0, was released a few days ago! 💪 In my guide, I have presented an example of updating Wazuh from version 4.12 to version 4.14. Link to the publication on Medium: https://lnkd.in/dsvpyhKW #Wazuh #WazuhSiem #SIEM #BlueTeam #WazuhAmbassadorProgram #wazuhambassador

  • Wazuh reposted this

    View profile for Laurent M.

    Author of Data-Shield IPv4 Blocklist • Cyber Security Engineer • Blue Teamer • CISO Acensi Group

    🚨Sortie récemment, voici la nouvelle version du célèbre HIDS | SIEM Open Source apportant son lot de nouveautés et de correctifs 📶Wazuh 4.14.0 - The Open Source Security Platform 💡Quelques highlights 🚀La version 4.14.0 améliore la fonctionnalité d’hygiène informatique avec un inventaire étendu qui comprend désormais des extensions de navigateur, des services de terminaux, des utilisateurs et des groupes. 🖥Il introduit également un nouveau tableau de bord de l’API Microsoft Graph pour la surveillance de l’activité et les événements d’audit des services cloud Microsoft, et ajoute la prise en charge du rechargement à chaud de la configuration de l’agent Wazuh. ✅En outre, cette version introduit de multiples améliorations en matière de stabilité, de performances et de sécurité sur l’ensemble de la plateforme. 👉https://lnkd.in/exkpsmJk (page des release notes autour de la nouvelle version) ⚠Pensez aux labs !!! #security #cybersecurity #hids #siem #soc

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • Wazuh reposted this

    I’ve been running a few exposed machines for Ryvora labs recently, and one thing has made a huge difference when tracing malicious activity — Visibility. Ingesting PowerShell command logs into Wazuh and using built in detection's to identify malicious commands has been a huge help in identifying endpoint level activity. Check out the full write up to get this setup in your environment! #Cybersecurity #BlueTeam #Wazuh #ThreatDetection

  • Wazuh reposted this

    View profile for Wilklins Nyatteng

    Cyber Security Engineer | Wazuh Ambassador | AWS Community Builder.

    Is your Wazuh Vulnerability Detection module giving you more noise than insight? I've just published a detailed guide: Practical Guide to Fine-Tuning Wazuh’s Vulnerability Detection Module. This article cuts straight to the configurations that matter, showing you how to: - Drastically reduce false positives for older systems. - Tailor vulnerability feeds to your specific OS/application stack. - Optimize database synchronization for faster, more accurate results. Stop managing irrelevant alerts and start focusing on real risk. Get the practical steps and configuration examples here: https://lnkd.in/drjecJp5 - Link to Wazuh webpage: https://lnkd.in/dvXKHQUD  - Link to Ambassadors program landing page: https://lnkd.in/d83zngzR #Wazuh #VulnerabilityManagement #CyberSecurity #SecurityOperations

  • Wazuh reposted this

    View profile for Kevin Branch

    Founder of Branch Network Consulting, LLC

    Day-one first impressions of Wazuh 4.14.0 by @BlueWolfNinja This morning I stumbled onto the release of Wazuh 4.14.0 before it was officially announced.  I quickly chased down the release notes, and finding references to promising improvements and fixes, I upgraded my Wazuh SIEM development stack from 4.13.1 to 4.14.0 without any trouble.  I also push-upgraded an active Windows and Linux agent to the new version. I am thus far favorably impressed.  Building on their major 4.13 achievement with stateful system inventory indexes, Wazuh has expanded to include even more osquery-like inventory collection, including cross-platform collection of services, local users and groups, and installed browser extensions.  They even had the class to represent group membership on both the user (user.groups) and group (group.users) levels.  You will find these new additions in the IT Hygiene dashboard, under Identities (users and groups), Services (OS level services), and Software (Browser Extensions). A new Microsoft Graph API dashboard has also been added. I also observe that with this release, Wazuh is continuing to exhibit intentionality about refining and expanding the scope of their Security Configuration Assessment (SCA) policies.  Also, they were even more aggressive than usual this time with attending to needed bug fixes in a variety of event analysis rules.  Kudos to Wazuh! Other than a few issues like Linux inventoried services always being assigned a process.pid of 0, and the lack of honoring pinned filters when moving in the IT Hygiene dashboard between Services and Processes, I am not seeing any major issues yet.  Though I recommend waiting before deploying it in production so soon, I would say 4.14.0 is off to a great start. Do note that 4.14.0 is now based on OpenSearch 2.19.3 instead of the 2.19.2 used in 4.13.x. If you have any non-Wazuh-native plugins in place, like the one for Anomaly Detection, you will presumably have to reinstall the 2.19.3-aligned version of such plugins. In order of depth, these are sources I would recommend exploring to get acquainted with this promising new version of Wazuh. https://lnkd.in/grSxM_wv https://lnkd.in/gbut6XGY https://lnkd.in/gxXwBTEu https://lnkd.in/gScPiyde https://lnkd.in/guyJ6uJn

  • View organization page for Wazuh

    67,520 followers

    🚀 Wazuh 4.14.0 is here! 🎉 The Wazuh 4.14.0 release enhances the IT Hygiene capability with an expanded inventory that now includes browser extensions, endpoint services, users, and groups. This release also introduces a new Microsoft Graph API dashboard and supports hot reload of Wazuh agent configuration. Find out more about these improvements in our new blog post: https://ow.ly/LG8r50Xh5F2 #InformationSecurity #CyberSecurity #OpenSource

  • View organization page for Wazuh

    67,520 followers

    Leverage Kubernetes StatefulSets and persistent volumes to deploy Wazuh agents in containerized environments. This preserves the Wazuh agent identity and ensures consistent visibility across dynamic clusters. Our latest blog explores Wazuh agent deployment strategies for persistence in Kubernetes Read more: https://ow.ly/enOv50Xgisu #InformationSecurity #CyberSecurity #OpenSource

Similar pages

Browse jobs