top of page
Articles
![Wazuh SIEM & XDR setup on Azure Linux virtual machine](https://static.wixstatic.com/media/5b813d_42ef9c9830fd43f49703b5fb5401f640~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_42ef9c9830fd43f49703b5fb5401f640~mv2.webp)
Jan 85 min read
Wazuh SIEM & XDR setup on Azure Linux virtual machine
This guide will show you how to setup a Wazuh server in Azure and connect your Windows clients for security monitoring within the Azure host
330
![](https://static.wixstatic.com/media/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.webp)
![Pyramid of Pain - Threat Hunting](https://static.wixstatic.com/media/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.webp)
Nov 4, 20245 min read
Pyramid of Pain - Threat Hunting
The Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
46
![Understanding DDoS Attacks: Methods, Tools, and Defense Strategies](https://static.wixstatic.com/media/5b813d_522273df7c0f48b3a9c0127e19ab827c~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_522273df7c0f48b3a9c0127e19ab827c~mv2.webp)
Jul 31, 20244 min read
Understanding DDoS Attacks: Methods, Tools, and Defense Strategies
Delve into how DDoS attacks are executed, tools hackers utilize, and the defensive measures companies can adopt to mitigate these threats.
43
![Security Analyst Tools](https://static.wixstatic.com/media/5b813d_5d6811b973d041aaa8ee134a2afcdce9~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_5d6811b973d041aaa8ee134a2afcdce9~mv2.webp)
Jun 9, 20244 min read
Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
147
![Security Onion SIEM Setup](https://static.wixstatic.com/media/5b813d_e2a26e149b234fe090d60b292b6ddf39~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_e2a26e149b234fe090d60b292b6ddf39~mv2.webp)
May 13, 20243 min read
Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
878
bottom of page