Adversary emulation using Atomic Red Team and identification of simulated attacks in Wazuh SIEM — comprehensive guide

Adversary emulation using Atomic Red Team and identification of simulated attacks in Wazuh SIEM — comprehensive guide

April 21st 2026 / Ambassadors
By Michał Bednarczyk / Medium

In this document, I will show you how you can simulate (preferably in a lab environment) various attacks that have been carried out by attackers in the past or are still being carried out today.

Read more
Automate Risk Management: Integrating Wazuh SIEM with SimpleRisk in Real-Time

Automate Risk Management: Integrating Wazuh SIEM with SimpleRisk in Real-Time

April 17th 2026 / Ambassadors
By Syed Jawad Ali Shah / Medium

Your SIEM fires dozens of high-severity alerts every day. Your GRC tool sits separately, waiting for someone to manually log risks. The gap between detection and documentation is where compliance breaks down, and where audit findings are born. This guide closes that gap entirely.

Read more
Security Monitoring with Wazuh & Suricata Without Agents on Production Servers

Security Monitoring with Wazuh & Suricata Without Agents on Production Servers

April 13th 2026 / Ambassadors
By Ludovic Gildas Doamba / Medium

This lab demonstrates an alternative approach: deploying a dedicated probe server in promiscuous mode, equipped with Suricata and a Wazuh agent, in order to detect multiple categories of web attacks without installing any agent on the target application server.

Read more
Automated DoS Mitigation

Automated DoS Mitigation

April 9th 2026 / Ambassadors
By Hafiz Javid / LinkedIn

This time I configured Wazuh to detect a SYN flood attack using a custom rule and a custom decoder that extracts the attacker’s IP from iptables kernel logs.

Read more
SOC Detection Egineering Lab

SOC Detection Egineering Lab

April 9th 2026 / Ambassadors
By Tareif Suliman / LinkedIn

SOC lab to simulate a realistic phishing based attack chain and explore how Security Operations Center teams can detect malicious activity using endpoint telemetry and SIEM correlation with Wazuh.

Read more