Integrating AlienVault OTX with Wazuh (Complete Guide)

Integrating AlienVault OTX with Wazuh (Complete Guide)

>
October 22nd 2025 / Ambassadors
By Juan Matthews Rebello Santos / Juan Matthews Blog

This complete guide explains step-by-step how to integrate AlienVault OTX (Open Threat Exchange) with Wazuh, allowing your monitoring environment to automatically detect known malicious domains and IP addresses.

October 22nd 2025 / Ambassadors

Integrating AlienVault OTX with Wazuh (Complete Guide)

By Juan Matthews Rebello Santos / Juan Matthews Blog

This complete guide explains step-by-step how to integrate AlienVault OTX (Open Threat Exchange) with Wazuh, allowing your monitoring environment to automatically detect known malicious domains and IP addresses.

Read more

>
Wazuh & WireGuard Logs Monitoring on a Linux Host

Wazuh & WireGuard Logs Monitoring on a Linux Host

>
October 20th 2025 / Ambassadors
By Jakub Zielinski / Medium

This guide provides a practical solution for monitoring of a Linux-based WireGuard server and integration with Wazuh.

October 20th 2025 / Ambassadors

Wazuh & WireGuard Logs Monitoring on a Linux Host

By Jakub Zielinski / Medium

This guide provides a practical solution for monitoring of a Linux-based WireGuard server and integration with Wazuh.

Read more

>
Home-Lab#4: Building a Detection Lab with Wazuh, Sysmon, and MITRE ATT&CK

Home-Lab#4: Building a Detection Lab with Wazuh, Sysmon, and MITRE ATT&CK

>
October 20th 2025 / Ambassadors
By Abdelmlak Said / Medium

In this edition, we’ll explore how to use Sysmon together with Wazuh to monitor Windows systems in real time.

October 20th 2025 / Ambassadors

Home-Lab#4: Building a Detection Lab with Wazuh, Sysmon, and MITRE ATT&CK

By Abdelmlak Said / Medium

In this edition, we’ll explore how to use Sysmon together with Wazuh to monitor Windows systems in real time.

Read more

>
Build A Modern SOC With Wazuh Open Source SIEM

Build A Modern SOC With Wazuh Open Source SIEM

>
October 17th 2025 / Ambassadors
By Sipho Kao / YouTube

As a result, businesses are now opting for Wazuh, which provides comparable visibility and flexibility without the financial burdens of commercial SIEMs.

October 17th 2025 / Ambassadors

Build A Modern SOC With Wazuh Open Source SIEM

By Sipho Kao / YouTube

As a result, businesses are now opting for Wazuh, which provides comparable visibility and flexibility without the financial burdens of commercial SIEMs.

Read more

>
Build A Modern SOC With Wazuh Open Source SIEM

Build A Modern SOC With Wazuh Open Source SIEM

>
October 17th 2025 / Ambassadors
By Sipho Kao / Medium

Businesses are now opting for Wazuh, which provides comparable visibility and flexibility without the financial burdens of commercial SIEMs.

October 17th 2025 / Ambassadors

Build A Modern SOC With Wazuh Open Source SIEM

By Sipho Kao / Medium

Businesses are now opting for Wazuh, which provides comparable visibility and flexibility without the financial burdens of commercial SIEMs.

Read more

>
Azure DevOps Wazuh Integration

Azure DevOps Wazuh Integration

>
October 17th 2025 / Ambassadors
By Yunus Emre ÇOBAN / Medium

This article will discuss why Azure DevOps logs are so important, how to integrate them with Wazuh, and the strategic advantages this integration provides to organizations.

October 17th 2025 / Ambassadors

Azure DevOps Wazuh Integration

By Yunus Emre ÇOBAN / Medium

This article will discuss why Azure DevOps logs are so important, how to integrate them with Wazuh, and the strategic advantages this integration provides to organizations.

Read more

>
Implementing Wazuh in Highly Segmented and Decentralized ­Networks: Syslog Forwarders, Custom Decoders, And Advanced Use Cases

Implementing Wazuh in Highly Segmented and Decentralized ­Networks: Syslog Forwarders, Custom Decoders, And Advanced Use Cases

>
October 17th 2025 / Ambassadors
By Raphooko Phooko / Medium

This writeup provides a comprehensive guide for security architects and engineers aiming to leverage Wazuh’s powerful capabilities in distributed, segmented network environments — expanding its applicability beyond traditional centralized models. But first, let me talk about Wazuh.

October 17th 2025 / Ambassadors

Implementing Wazuh in Highly Segmented and Decentralized ­Networks: Syslog Forwarders, Custom Decoders, And Advanced Use Cases

By Raphooko Phooko / Medium

This writeup provides a comprehensive guide for security architects and engineers aiming to leverage Wazuh’s powerful capabilities in distributed, segmented network environments — expanding its applicability beyond traditional centralized models. But first, let me talk about Wazuh.

Read more

>
Collecting System Inventory with Syscollector

Collecting System Inventory with Syscollector

>
October 17th 2025 / Ambassadors
By Hafiz Javid / Hafiz Blog

In this tutorial, I walk through how to collect and analyze system inventory including hardware, OS details, installed software, running processes, and open ports.

October 17th 2025 / Ambassadors

Collecting System Inventory with Syscollector

By Hafiz Javid / Hafiz Blog

In this tutorial, I walk through how to collect and analyze system inventory including hardware, OS details, installed software, running processes, and open ports.

Read more

>
Improving Azure Visibility and Secrets Monitoring with Wazuh and Custom Dashboards

Improving Azure Visibility and Secrets Monitoring with Wazuh and Custom Dashboards

>
October 16th 2025 / Ambassadors
By Efam Harris / Medium

This article builds on the same principles but focuses on Azure. As I always say, visibility is key to cloud security. You can’t protect what you can’t see.

October 16th 2025 / Ambassadors

Improving Azure Visibility and Secrets Monitoring with Wazuh and Custom Dashboards

By Efam Harris / Medium

This article builds on the same principles but focuses on Azure. As I always say, visibility is key to cloud security. You can’t protect what you can’t see.

Read more

>