Supercharge Wazuh Active Response with CoPilot: No More Limits!

Supercharge Wazuh Active Response with CoPilot: No More Limits!

>
June 1st 2025 / Ambassadors
By Taylor Walton / YouTube

In this video, explore a smarter and more flexible way to use Wazuh’s active response. Learn how to bypass built-in limitations, trigger responses via Graylog and Copilot APIs, run custom scripts like DNS sinkholing, and automate actions with powerful Graylog alerts.

June 1st 2025 / Ambassadors

Supercharge Wazuh Active Response with CoPilot: No More Limits!

By Taylor Walton / YouTube

In this video, explore a smarter and more flexible way to use Wazuh’s active response. Learn how to bypass built-in limitations, trigger responses via Graylog and Copilot APIs, run custom scripts like DNS sinkholing, and automate actions with powerful Graylog alerts.

Read more

>
Master Sysmon Config Management with CoPilot & Wazuh!

Master Sysmon Config Management with CoPilot & Wazuh!

>
May 31st 2025 / Ambassadors
By Taylor Walton / YouTube

Learn how to dynamically manage Sysmon configurations across multiple customers using CoPilot and Wazuh in this step-by-step video guide!

May 31st 2025 / Ambassadors

Master Sysmon Config Management with CoPilot & Wazuh!

By Taylor Walton / YouTube

Learn how to dynamically manage Sysmon configurations across multiple customers using CoPilot and Wazuh in this step-by-step video guide!

Read more

>
Securing CI/CD workflows with Wazuh

Securing CI/CD workflows with Wazuh

>
May 21st 2025 / External Media
By The Hacker News

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code…

May 21st 2025 / External Media

Securing CI/CD workflows with Wazuh

By The Hacker News

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code…

Read more

>
De l’alerte au ticket sans lever le petit doigt

De l’alerte au ticket sans lever le petit doigt

>
May 21st 2025 / Ambassadors
By Killian Prin-Abeil / Aukfood

L’article décrit comment automatiser la gestion des alertes Wazuh via Tracecat : attribution de priorité et sévérité selon la réputation IP, puis création automatique de tickets avec commentaires enrichis issus des métadonnées de l’alerte.

May 21st 2025 / Ambassadors

De l’alerte au ticket sans lever le petit doigt

By Killian Prin-Abeil / Aukfood

L’article décrit comment automatiser la gestion des alertes Wazuh via Tracecat : attribution de priorité et sévérité selon la réputation IP, puis création automatique de tickets avec commentaires enrichis issus des métadonnées de l’alerte.

Read more

>
Optimising CTI through Wazuh and Yeti platform integration

Optimising CTI through Wazuh and Yeti platform integration

>
May 7th 2025 / Ambassadors
By Ekangwo Hernandez / Medium

Cyber threats are getting smarter, so should your defences. Using Wazuh for security monitoring, you already know it’s a powerhouse for detecting attacks, tracking vulnerabilities, and ensuring compliance. But what if you could make it even sharper?…

May 7th 2025 / Ambassadors

Optimising CTI through Wazuh and Yeti platform integration

By Ekangwo Hernandez / Medium

Cyber threats are getting smarter, so should your defences. Using Wazuh for security monitoring, you already know it’s a powerhouse for detecting attacks, tracking vulnerabilities, and ensuring compliance. But what if you could make it even sharper?…

Read more

>
Cryptographic Timestamping for Wazuh Archive Logs

Cryptographic Timestamping for Wazuh Archive Logs

>
May 4th 2025 / Ambassadors
By Zafer Balkan / Zafer Balkan Blog

In security monitoring environments, log files are not just activity records; they are often the primary evidence in incident response, threat investigations, and compliance audits. However, without cryptographic protections, logs can be altered, backdated…

May 4th 2025 / Ambassadors

Cryptographic Timestamping for Wazuh Archive Logs

By Zafer Balkan / Zafer Balkan Blog

In security monitoring environments, log files are not just activity records; they are often the primary evidence in incident response, threat investigations, and compliance audits. However, without cryptographic protections, logs can be altered, backdated…

Read more

>
Enhancing your DevSecOps with Wazuh, the open source XDR platform

Enhancing your DevSecOps with Wazuh, the open source XDR platform

>
April 14th 2025 / External Media
By Bleeping Computer

DevSecOps, short for Development, Security, and Operations, is a methodology that integrates security practices into software Development Operations (DevOps). It emphasizes that security should be a shared responsibility across development…

April 14th 2025 / External Media

Enhancing your DevSecOps with Wazuh, the open source XDR platform

By Bleeping Computer

DevSecOps, short for Development, Security, and Operations, is a methodology that integrates security practices into software Development Operations (DevOps). It emphasizes that security should be a shared responsibility across development…

Read more

>