Wazuh Rulesets as Code (RaC)

Wazuh Rulesets as Code (RaC)

>
September 4th 2025 / Ambassadors
By Killian Prin Abeil / Aukfood

Dans ce nouvel article, nous allons explorer concrètement la mise en place de Wazuh RaC en utilisant un dépôt Detection-Engineering as Code (DaC) dédié. L’objectif est d’automatiser tout le cycle de vie des règles personnalisées de leur création jusqu’à leur déploiement en s’appuyant sur un pipeline CI/CD.

September 4th 2025 / Ambassadors

Wazuh Rulesets as Code (RaC)

By Killian Prin Abeil / Aukfood

Dans ce nouvel article, nous allons explorer concrètement la mise en place de Wazuh RaC en utilisant un dépôt Detection-Engineering as Code (DaC) dédié. L’objectif est d’automatiser tout le cycle de vie des règles personnalisées de leur création jusqu’à leur déploiement en s’appuyant sur un pipeline CI/CD.

Read more

>
Sasha vs. OpenCanary & Wazuh

Sasha vs. OpenCanary & Wazuh

>
August 31st 2025 / Ambassadors
By Kat Fitzgerald / Sasha the Flamingo

I immersed myself in developing custom Wazuh rules for OpenCanary honeypots. While one might expect more glamorous tasks, the reality involved navigating complex regular expressions and troubleshooting decoder configurations.

August 31st 2025 / Ambassadors

Sasha vs. OpenCanary & Wazuh

By Kat Fitzgerald / Sasha the Flamingo

I immersed myself in developing custom Wazuh rules for OpenCanary honeypots. While one might expect more glamorous tasks, the reality involved navigating complex regular expressions and troubleshooting decoder configurations.

Read more

>
Wazuh Shard Management and Log Retention — Comprehensive Instruction

Wazuh Shard Management and Log Retention — Comprehensive Instruction

>
August 29th 2025 / Ambassadors
By Michał Bednarczyk / Medium

In this guide, you will learn how to prevent the above-mentioned problems and effectively and efficiently manage shards and the log retention process.

August 29th 2025 / Ambassadors

Wazuh Shard Management and Log Retention — Comprehensive Instruction

By Michał Bednarczyk / Medium

In this guide, you will learn how to prevent the above-mentioned problems and effectively and efficiently manage shards and the log retention process.

Read more

>
Useful Wazuh Rules and Capabilities for Threat Detection

Useful Wazuh Rules and Capabilities for Threat Detection

>
August 29th 2025 / Ambassadors
By Ismael Barrantes / Medium

This article explores 10 useful Wazuh rules and platform capabilities that security teams can leverage across different types of environments. These are not presented as a ranked “top 10” because effectiveness depends heavily on context.

August 29th 2025 / Ambassadors

Useful Wazuh Rules and Capabilities for Threat Detection

By Ismael Barrantes / Medium

This article explores 10 useful Wazuh rules and platform capabilities that security teams can leverage across different types of environments. These are not presented as a ranked “top 10” because effectiveness depends heavily on context.

Read more

>
Building Real-Time Brute Force Attack Detection with Wazuh & n8n

Building Real-Time Brute Force Attack Detection with Wazuh & n8n

>
August 27th 2025 / Ambassadors
By Wenupa De Silva / Medium

In this guide, I’ll show you how to build a production-ready automated security system using Wazuh and n8n (workflow automation) that:
Detects brute force attacks in real-time
Enriches attacker data with location and threat intelligence
Alerts your team instantly via Slack with actionable information
Scales to handle multiple attack types automatically

August 27th 2025 / Ambassadors

Building Real-Time Brute Force Attack Detection with Wazuh & n8n

By Wenupa De Silva / Medium

In this guide, I’ll show you how to build a production-ready automated security system using Wazuh and n8n (workflow automation) that:
Detects brute force attacks in real-time
Enriches attacker data with location and threat intelligence
Alerts your team instantly via Slack with actionable information
Scales to handle multiple attack types automatically

Read more

>
Wazuh Custom Dashboard & Attack Statistics

Wazuh Custom Dashboard & Attack Statistics

>
August 26th 2025 / Ambassadors
By Ismail Hakim / Medium

A Wazuh Custom Dashboard is a personalized set of visualizations that you build inside the Wazuh Dashboard to monitor and analyze specific security data that matters to you.

August 26th 2025 / Ambassadors

Wazuh Custom Dashboard & Attack Statistics

By Ismail Hakim / Medium

A Wazuh Custom Dashboard is a personalized set of visualizations that you build inside the Wazuh Dashboard to monitor and analyze specific security data that matters to you.

Read more

>
Integrating Wazuh CTI with the Vulnerability Management Process

Integrating Wazuh CTI with the Vulnerability Management Process

>
August 25th 2025 / Ambassadors
By Enzo Manzanares / Medium

The article explains how Wazuh CTI integrates into the vulnerability management process by detecting and correlating CVEs with endpoint data.
It helps prioritize threats based on severity, exploitability, and patch status, offering clear remediation guidance.
Automation, dashboards, and reporting features streamline tracking and improve threat response efficiency.

August 25th 2025 / Ambassadors

Integrating Wazuh CTI with the Vulnerability Management Process

By Enzo Manzanares / Medium

The article explains how Wazuh CTI integrates into the vulnerability management process by detecting and correlating CVEs with endpoint data.
It helps prioritize threats based on severity, exploitability, and patch status, offering clear remediation guidance.
Automation, dashboards, and reporting features streamline tracking and improve threat response efficiency.

Read more

>