Skip to content

PlainlySec

  • Home
  • About PlainlySec
  • Contact
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • 🏆 Scoreboard
  • 🚩 CTF

Wazuh & SIEM Tutorials

Practical Wazuh and open-source SIEM tutorials

Threat Hunting with YARA: Writing Rules That Catch Malware

May 4, 2026May 2, 2026 by PlainlySec Team

Write YARA malware detection rules from scratch: rule syntax, analyzing samples to find unique indicators, advanced PE module conditions, entropy-based packing detection, and free rule collections to get started.

Categories Wazuh & SIEM Tutorials

Threat Intelligence: How to Use Free OSINT Feeds to Defend Your Organization

May 1, 2026May 1, 2026 by PlainlySec Team

Free threat intelligence sources — AlienVault OTX, Feodo tracker, VirusTotal API — with Python code to consume feeds and Wazuh integration for automatic IOC-based detection.

Categories Wazuh & SIEM Tutorials

Top 10 SIEM Use Cases Every Security Team Should Implement

May 1, 2026May 1, 2026 by PlainlySec Team

Top 10 SIEM detection use cases with real Wazuh rules and Splunk/Sentinel KQL — brute force, lateral movement, ransomware, data exfiltration, and credential dumping detection.

Categories Wazuh & SIEM Tutorials

Security Logging and Monitoring: What to Log, Where to Store It, and How to Alert

May 1, 2026May 1, 2026 by PlainlySec Team

Security logging best practices — what events to log, critical Windows and Linux audit rules, building effective alerts with Wazuh, and protecting log integrity from attackers.

Categories Wazuh & SIEM Tutorials

Introduction to Network Security Monitoring: Detecting Threats on Your Network

May 1, 2026April 30, 2026 by PlainlySec Team

Learn how to implement network security monitoring using open-source tools like Zeek, Suricata, and Security Onion to detect threats on your network in real time.

Categories Wazuh & SIEM Tutorials

SIEM Detection Rules That Actually Work: Splunk, Elastic, and Wazuh Guide

May 1, 2026April 30, 2026 by PlainlySec Team

Write and tune detection rules in Splunk, Elastic, and Wazuh — with real queries for brute force, ransomware, credential dumping, and lateral movement.

Categories Wazuh & SIEM Tutorials

Threat Hunting for Beginners: Find Attackers Before They Strike

May 1, 2026April 30, 2026 by PlainlySec Team

Learn proactive threat hunting using Splunk, Zeek, and Sysmon — with real detection queries for LOLBins, DNS tunneling, lateral movement, and C2 beaconing.

Categories Wazuh & SIEM Tutorials

Vulnerability Management: How to Find and Fix Security Holes Before Attackers Do

May 1, 2026April 30, 2026 by PlainlySec Team

Vulnerability management is the process of continuously finding, prioritizing, and fixing security weaknesses. Learn how to set up a vulnerability management program using free tools like OpenVAS and Nessus Essentials.

Categories Wazuh & SIEM Tutorials

How to Build a Free SIEM with Wazuh: Getting Started Guide

May 1, 2026April 29, 2026 by PlainlySec Team

A practical getting-started guide to building a free, enterprise-grade SIEM with Wazuh — covers architecture, installation on Ubuntu, agent deployment on Windows and Linux, and key out-of-the-box detections.

Categories Wazuh & SIEM Tutorials Leave a comment

Recent Posts

  • Home Wi-Fi Router Security: The Complete Hardening Guide
  • The Most Dangerous Vulnerabilities From April-May 2026: What To Patch Now
  • CISM vs CISSP: Which Certification Should You Choose?
  • CISM 2026: The Practical Preparation Playbook
  • CEH 2026: Complete Exam and Practical Guide

Recent Comments

No comments to show.
© 2026 PlainlySec • Built with GeneratePress