Wazuh Series: Wazuh setup for threat detection, proactive monitoring, and malware analysis.

Wazuh Series: Wazuh setup for threat detection, proactive monitoring, and malware analysis.

November 29th 2025 / External Media
By Chinaza Emmanuela Obidike / Medium

Wazuh is a security platform that offers unified XDR (Extended Detection and Response) and SIEM (Security Information and Event Management) protection for endpoints and cloud workloads. It consists of a single universal agent and three main…

Read more
Detect APT Group With Wazuh Part One

Detect APT Group With Wazuh Part One

November 23rd 2025 / External Media
By Vikas Chauhan / Medium

STRONTIUM is a Russian-based threat actor associated with the Russian General Staff Main Intelligence Directorate (GRU) and operates under the name Forest Blizzard. Forest Blizzard has also utilized a custom post-compromise tool named…

Read more
Why Your Organization Needs Wazuh: A Complete Security Solution

Why Your Organization Needs Wazuh: A Complete Security Solution

November 23rd 2025 / External Media
By Hasitha Upekshitha / Medium

In an era where cyber threats are growing in sophistication, organizations need robust, scalable, and intelligent security solutions to protect their infrastructure. Wazuh, an open-source Extended Detection and Response (XDR) and Security…

Read more
Automating Security with Wazuh Active Response

Automating Security with Wazuh Active Response

November 17th 2025 / External Media
By Rajeev Gaddam / Medium

In our previous discussions, we’ve covered the foundational aspects of Wazuh, including installation and troubleshooting common issues. Today, we’re excited to delve deeper into a powerful…

Read more
All-in-One Single-Node Automation Setup for Wazuh 4.9

All-in-One Single-Node Automation Setup for Wazuh 4.9

November 3rd 2025 / External Media
By Vikas Chauhan / Medium

Implementing a security monitoring system can often be complicated and a huge time investment. With Wazuh, you get an open-source integration of host-based intrusion detection, log analysis, and vulnerability management all in a single…

Read more
Suricata-Wazuh 4.9 Test Case: Monitoring Attacks with DVWA and tmNIDS

Suricata-Wazuh 4.9 Test Case: Monitoring Attacks with DVWA and tmNIDS

November 3rd 2025 / External Media
By Iwhai Hanafi / Medium

In this post, I’ll continue our exploration of integrating Suricata with Wazuh 4.9 by applying the setup to a practical security use case. We’ll use DVWA (Damn Vulnerable Web Application) as our attack target and tmNIDS as a testing and monitoring…

Read more
Securing CI/CD workflows with Wazuh

Securing CI/CD workflows with Wazuh

May 21st 2025 / External Media
By The Hacker News

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code…

Read more
Enhancing your DevSecOps with Wazuh, the open source XDR platform

Enhancing your DevSecOps with Wazuh, the open source XDR platform

April 14th 2025 / External Media
By Bleeping Computer

DevSecOps, short for Development, Security, and Operations, is a methodology that integrates security practices into software Development Operations (DevOps). It emphasizes that security should be a shared responsibility across development…

Read more
Wazuh Wizardry: Building a High-Impact Security Operations Center

Wazuh Wizardry: Building a High-Impact Security Operations Center

April 3rd 2025 / External Media
By Rahim Ali / Medium

In an era defined by increasingly sophisticated and frequent cyber threats, the ability of an organization to proactively monitor, detect, and respond to security incidents is paramount. A Security Operations Center (SOC) serves as the…

Read more