Two AI Assistants for Cybersecurity: Wazuh and AWS Under the LLM Microscope

When Your SOC Analyst Can’t Keep Up (Or Just Needs a Break)

Let’s be honest: analyzing thousands of security events every day isn’t the most exciting job.

[Read More]

Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis

Introducing Wazuh LLM: Why Specialized Security Analysis Matters

In the cybersecurity world, SOC specialists deal with massive streams of security events daily. Analyzing each alert requires deep knowledge, experience, and time. That’s why I created a specialized language model to assist security analysts in their day-to-day operations.

[Read More]

Boosting Container Image Security Using Wazuh and Trivy

This article draws inspiration from the Wazuh blog post on enhancing container image security with Wazuh and Trivy.

Containerization has revolutionized software development and deployment, offering scalability and efficiency.

However, this agility can introduce security risks if container images aren’t properly secured.

Vulnerabilities within these images can expose your entire system to threats. This is where the combined power of Wazuh and Trivy comes in.

These open-source tools provide a comprehensive solution for boosting your container image security, ensuring your applications are protected from the ground up.

[Read More]

Applying RAG for Working with Wazuh Documentation: A Step-by-Step Guide (Part 2)

Series Navigation:

Related Reading:

Prerequisites and Environment Setup

For local RAG development, ensure you have the following requirements:

[Read More]

Applying RAG for Wazuh Documentation: A Step-by-Step Guide (Part 1)

Introduction to RAG

Retrieval-Augmented Generation (RAG) is a method that allows the use of information from various sources to generate more accurate and useful responses to questions.

[Read More]

Enhancing Wazuh with Ollama: Boosting Cybersecurity (Part 4)

Continuing the Series: Integrating a Wazuh Cluster with Ollama — Part 4. Configuration and Implementation

Series Navigation:

[Read More]

Enhancing Wazuh with Ollama: Boosting Cybersecurity (Part 3)

Wazuh and Ollama: Part 3. Creating Integration Between Your Wazuh Cluster and Ollama

Series Navigation:

[Read More]

Enhancing Wazuh with Ollama: Boosting Cybersecurity (Part 2)

Wazuh and Ollama: Part 2. Deploying the Wazuh Cluster

Series Navigation:

[Read More]

Enhancing Wazuh with Ollama: A Cybersecurity Boost (Part 1)

Introduction

Welcome to the first part of our guide on enhancing Wazuh with Ollama!

[Read More]

How to Set Up a Custom Integration between Wazuh and MARK

Introduction

Integrating Wazuh SIEM with MARK (Mitigation Anomaly Revelation Keeper) enables automated threat detection and enriches security alerts with intelligence data. This guide walks you through setting up a custom integration for enhanced SOC operations.

[Read More]