Introduction to Threat Hunting

Introduction to Threat Hunting

January 23rd 2026 / Ambassadors
By Hafiz Javid / LinkedIn

Short guide introducing threat hunting as a proactive security process, focused on investigating archived logs using Discover and query-based searching rather than relying on alerts.

Read more
Leveraging Wazuh for Continuous Regulatory Adherence

Leveraging Wazuh for Continuous Regulatory Adherence

January 19th 2026 / Ambassadors
By Wilklins Nyatteng / Medium

This article explores Wazuh’s core capabilities for regulatory compliance, demonstrates built-in support for key standards, and provides a practical example of extending these features to the Kenya Data Protection Act of 2019 (KDPA) — a GDPR-inspired law increasingly relevant for organizations operating in or processing data from Kenya.

Read more
Extend Auditd decoder in Wazuh: extract PROCTITLE correctly

Extend Auditd decoder in Wazuh: extract PROCTITLE correctly

January 16th 2026 / Ambassadors
By Michael Muenz / Michael Muenz's Blog

This article shows how to extend your auditd decoders in Wazuh to ensure PROCTITLEreliable extraction, based on best practices and official sources.

Read more
Detecting Duplicate Rule IDs in Wazuh: A Comprehensive Guide

Detecting Duplicate Rule IDs in Wazuh: A Comprehensive Guide

January 15th 2026 / Ambassadors
By Muhammad Moiz Uddin Rafay / Medium

In this article, we will delve into the importance of detecting duplicate rule IDs, methods to identify them, and steps for effective resolution to maintain a streamlined and accurate security monitoring system.

Read more
Understanding & Manipulating JSON Decoders – Wazuh

Understanding & Manipulating JSON Decoders – Wazuh

January 15th 2026 / Ambassadors
By Syed Golam Abid / Alsechemist

The document explains how Wazuh’s built-in JSON decoder works and why it often takes precedence over custom JSON decoders due to its default configuration. It shows that the generic decoder’s broad matching can override user-defined decoders unless the built-in one is excluded or ordered properly

Read more
FILE INTEGRITY MONITORING WITH WAZUH — COMPREHENSIVE GUIDE

FILE INTEGRITY MONITORING WITH WAZUH — COMPREHENSIVE GUIDE

January 15th 2026 / Ambassadors
By Michał Bednarczyk / Medium

In this article, I will show you step by step how to properly configure the FIM module in Wazuh and how to use it properly. I will also present you with a few examples where you will see how the FIM module is used in “action.”

Read more