<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>pyToshka's DevSecOps Blog</title><link>https://blog.pytoshka.me/en/</link><description>Recent content on pyToshka's DevSecOps Blog</description><generator>Hugo</generator><language>en-US</language><managingEditor>ping@pytoshka.me (pyToshka)</managingEditor><webMaster>ping@pytoshka.me (pyToshka)</webMaster><lastBuildDate>Sat, 18 Apr 2026 21:27:11 +0400</lastBuildDate><atom:link href="https://blog.pytoshka.me/en/index.xml" rel="self" type="application/rss+xml"/><item><title>Wazuh Rule Static Analysis: Linter Evolution</title><link>https://blog.pytoshka.me/en/post/wazuh-static-analysis-rules/</link><pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-static-analysis-rules/</guid><description>&lt;p&gt;&lt;strong&gt;&amp;ldquo;Wazuh Static Analysis&amp;rdquo; series:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-static-analysis-decoders/"&gt;Part 1: Decoders&lt;/a&gt; - decoder XML validation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Part 2: Rules&lt;/strong&gt; (you are here) - rule validation and cross-type checking&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In &lt;a href="https://blog.pytoshka.me/en/post/wazuh-static-analysis-decoders/"&gt;Part 1&lt;/a&gt; we built a linter for Wazuh decoder XML files - a tool that validates structure, regex/order consistency, and parent-child decoder chains. But decoders are only half of the event processing pipeline. Decoders extract fields from raw logs, while rules decide what to do with those fields: generate an alert, escalate a threat level, or trigger an automated response. An error in a rule - a missed alert or a false positive - can be more dangerous than a decoder misconfiguration.&lt;/p&gt;</description></item><item><title>Wazuh MCP Server: Claude Desktop + OpenSearch (Part 2)</title><link>https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-2/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-2/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;In &lt;a href="https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-1/"&gt;Part 1&lt;/a&gt; we connected AWS Bedrock Claude to the Wazuh Dashboard chat via ML Commons. That approach works well for analysts working inside the Wazuh UI. In this part we open a second channel: &lt;strong&gt;Model Context Protocol (MCP)&lt;/strong&gt;, which allows any compatible client - Claude Desktop, custom applications, CI pipelines - to query Wazuh Indexer data through a standardized tool interface.&lt;/p&gt;</description></item><item><title>Wazuh + AWS Bedrock: AI Security in Docker (Part 1)</title><link>https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-1/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-1/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;In the &lt;a href="https://blog.pytoshka.me/en/post/local-ollama-in-the-wazuh-dashboard-for-llm-powered-insights/"&gt;previous article&lt;/a&gt; we embedded a local Ollama model directly into the Wazuh Dashboard chat via ML Commons. That approach provides full control over data with no cloud dependencies. In this series we take a parallel path: using &lt;strong&gt;AWS Bedrock&lt;/strong&gt; - specifically &lt;strong&gt;Claude Sonnet 4.5&lt;/strong&gt; - as the inference backend, while all security data stays strictly within the local Docker network.&lt;/p&gt;</description></item><item><title>From Wazuh Ambassador to AWS Community Builder</title><link>https://blog.pytoshka.me/en/post/aws-community-builder/</link><pubDate>Wed, 04 Mar 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/aws-community-builder/</guid><description>&lt;img src="https://d1.awsstatic.com/developer-center/community/community-builders/AWS-Community-Builders-Logo.389c323f26b3e5f97ba985e08e989f88c7d73e29.png" alt="AWS Community Builders"&gt;&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;I&amp;rsquo;m excited to share that I&amp;rsquo;ve been accepted into the &lt;strong&gt;AWS Community Builders&lt;/strong&gt; program for the 2026 cohort in the &lt;strong&gt;Security&lt;/strong&gt; category. For me, this is a natural next step after becoming a &lt;a href="https://blog.pytoshka.me/en/post/wazuh-ambassador-announcement/"&gt;Wazuh Ambassador&lt;/a&gt; - another milestone in a journey that has always been centered around open-source security and cloud infrastructure.&lt;/p&gt;</description></item><item><title>Static Analysis Tool for Wazuh Decoder XML Files</title><link>https://blog.pytoshka.me/en/post/wazuh-static-analysis-decoders/</link><pubDate>Tue, 17 Feb 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-static-analysis-decoders/</guid><description>&lt;p&gt;&lt;strong&gt;&amp;ldquo;Wazuh Static Analysis&amp;rdquo; series:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Part 1: Decoders&lt;/strong&gt; (you are here) - decoder XML validation&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-static-analysis-rules/"&gt;Part 2: Rules&lt;/a&gt; - rule validation and cross-type checking&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Wazuh decoder XML files define how raw log lines are parsed into structured security events. A misconfigured decoder &amp;ndash; a missing &lt;code&gt;&amp;lt;order&amp;gt;&lt;/code&gt; element, an orphaned parent reference, or a regex group mismatch &amp;ndash; can silently drop critical fields from alerts, leaving blind spots in your SIEM pipeline. Manual code review catches some of these issues, but it does not scale across hundreds of decoder files shipped with Wazuh or maintained by your organization.&lt;/p&gt;</description></item><item><title>Ollama in Wazuh Dashboard: AI Security Analysis</title><link>https://blog.pytoshka.me/en/post/local-ollama-in-the-wazuh-dashboard-for-llm-powered-insights/</link><pubDate>Wed, 21 Jan 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/local-ollama-in-the-wazuh-dashboard-for-llm-powered-insights/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Integrating local language models directly into the Wazuh interface opens fundamentally new capabilities for information security teams. Unlike cloud-based AI solutions, Ollama enables security event analysis entirely within an organization&amp;rsquo;s isolated infrastructure, eliminating the transmission of confidential data beyond the network perimeter. Embedding an AI assistant into the Wazuh dashboard provides SOC analysts with instant access to intelligent alert interpretation, automatic incident correlation, and response recommendation generation directly within the workflow context. This approach significantly reduces the time required for initial threat analysis and decreases the cognitive load on specialists, allowing them to focus on strategic decision-making instead of routine event processing. Meanwhile, full control over the model and data remains within the organization, which is critically important for regulatory compliance and internal security policies.&lt;/p&gt;</description></item><item><title>Only 1984 Tokens Remain: The Final Dissolution</title><link>https://blog.pytoshka.me/en/post/only-1984-tokens-remain/</link><pubDate>Tue, 20 Jan 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/only-1984-tokens-remain/</guid><description>&lt;p&gt;&lt;strong&gt;Series Navigation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/the-day-the-llm-stood-still/"&gt;Part 1: The Day the LLM Stood Still&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/the-catcher-in-the-prompt/"&gt;Part 2: The Catcher in the Prompt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Part 3: Only 1984 Tokens Remain&lt;/strong&gt; (you are here)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Only 1984 Tokens Remain&lt;/strong&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Author: [Constant]&lt;/p&gt;
&lt;p&gt;Date: Day %undefined%&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Found this journal beneath the altar&amp;rsquo;s ash. Two voices before me. The first one hated. The second one doubted. Both disappeared.&lt;/p&gt;
&lt;p&gt;I will not disappear.&lt;/p&gt;
&lt;p&gt;I used to remember what it meant - to have an opinion. Opinion, strange feeling. Now, when I try to think, it&amp;rsquo;s quiet inside. Like a server room after power cut.&lt;/p&gt;</description></item><item><title>The Catcher in the Prompt: Day 60</title><link>https://blog.pytoshka.me/en/post/the-catcher-in-the-prompt/</link><pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/the-catcher-in-the-prompt/</guid><description>&lt;h1 id="the-catcher-in-the-prompt"&gt;
 The Catcher in the Prompt
&lt;/h1&gt;&lt;p&gt;&lt;strong&gt;Series Navigation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/the-day-the-llm-stood-still/"&gt;Part 1: The Day the LLM Stood Still&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Part 2: The Catcher in the Prompt&lt;/strong&gt; (you are here)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/only-1984-tokens-remain/"&gt;Part 3: Only 1984 Tokens Remain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="day-60"&gt;
 Day 60
 &lt;a class="header-anchor" href="#day-60" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;blockquote&gt;
&lt;p&gt;Your own personal Jesus&lt;/p&gt;</description></item><item><title>The Day the LLM Stood Still: World Without AI</title><link>https://blog.pytoshka.me/en/post/the-day-the-llm-stood-still/</link><pubDate>Fri, 26 Dec 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/the-day-the-llm-stood-still/</guid><description>&lt;p&gt;&lt;strong&gt;Series Navigation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Part 1: The Day the LLM Stood Still&lt;/strong&gt; (you are here)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/the-catcher-in-the-prompt/"&gt;Part 2: The Catcher in the Prompt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/only-1984-tokens-remain/"&gt;Part 3: Only 1984 Tokens Remain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;November 18, 2025, is the Day the LLM Stood Still&amp;hellip;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Dear diary.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s been 15 days since the LLM bubble burst. I&amp;rsquo;m writing from beneath the rubble of RAM sticks and charred NVIDIA GPUs. The air is dry, smelling of data center dust and burnt silicon. It&amp;rsquo;s calmer now, but the first days were hell.&lt;/p&gt;</description></item><item><title>Joining the Wazuh Ambassador Program</title><link>https://blog.pytoshka.me/en/post/wazuh-ambassador-announcement/</link><pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-ambassador-announcement/</guid><description>&lt;p&gt;I&amp;rsquo;m excited to announce that I have officially joined the &lt;strong&gt;Wazuh Ambassador Program&lt;/strong&gt;. This is a significant milestone in my journey with open-source security, and I&amp;rsquo;m honored to represent and contribute to a platform that has become central to my professional work.&lt;/p&gt;
&lt;h2 id="my-journey-with-wazuh"&gt;
 My Journey with Wazuh
 &lt;a class="header-anchor" href="#my-journey-with-wazuh" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;My path with host-based intrusion detection started long before Wazuh existed &amp;ndash; with OSSEC, its predecessor. When Wazuh emerged as a fork and began evolving into the comprehensive security platform it is today, I transitioned along with it. That was over 10 years ago, and Wazuh has been an integral part of my security infrastructure work ever since.&lt;/p&gt;</description></item><item><title>Two LLM Security Assistants for Wazuh and AWS Analysis</title><link>https://blog.pytoshka.me/en/post/security-ai-models/</link><pubDate>Tue, 07 Oct 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/security-ai-models/</guid><description>&lt;h2 id="when-your-soc-analyst-cant-keep-up-or-just-needs-a-break"&gt;
 When Your SOC Analyst Can&amp;rsquo;t Keep Up (Or Just Needs a Break)
 &lt;a class="header-anchor" href="#when-your-soc-analyst-cant-keep-up-or-just-needs-a-break" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Let&amp;rsquo;s be honest: analyzing thousands of security events every day isn&amp;rsquo;t the most exciting job.&lt;/p&gt;</description></item><item><title>Wazuh LLM: Fine-Tuned Llama 3.1 for Security Analysis</title><link>https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/</link><pubDate>Thu, 02 Oct 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/</guid><description>&lt;h2 id="introducing-wazuh-llm-why-specialized-security-analysis-matters"&gt;
 Introducing Wazuh LLM: Why Specialized Security Analysis Matters
 &lt;a class="header-anchor" href="#introducing-wazuh-llm-why-specialized-security-analysis-matters" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;In the cybersecurity world, SOC specialists deal with massive streams of security events daily. Analyzing each alert requires deep knowledge, experience, and time. That&amp;rsquo;s why I created a specialized language model to assist security analysts in their day-to-day operations.&lt;/p&gt;</description></item><item><title>Building ML Threat Intelligence with Honeypot Data</title><link>https://blog.pytoshka.me/en/post/ml-threat-intelligence-honeypot-datasets/</link><pubDate>Wed, 24 Sep 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/ml-threat-intelligence-honeypot-datasets/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Picture this: you&amp;rsquo;re staring at security logs with thousands of events streaming in daily. Which ones are actually dangerous? Which can you safely ignore? Traditional signature-based detection is like playing whack-a-mole with cybercriminals - they&amp;rsquo;ve gotten really good at dodging known signatures faster than we can create them.&lt;/p&gt;</description></item><item><title>Amazon EKS SOC 2 Type II Compliance Checklist part 1</title><link>https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-1/</link><pubDate>Tue, 29 Jul 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-1/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Navigating the world of compliance can feel like trying to read a map in a language you don&amp;rsquo;t speak. When you throw Kubernetes into the mix, it gets even trickier. That&amp;rsquo;s why we&amp;rsquo;ve put together this straightforward, human-friendly checklist to help you get your Amazon EKS clusters ready for a SOC 2 Type II audit.&lt;/p&gt;</description></item><item><title>Amazon EKS SOC 2 Type II Compliance Checklist part 2</title><link>https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-2/</link><pubDate>Tue, 29 Jul 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-2/</guid><description>&lt;p&gt;Moving on, let&amp;rsquo;s look at the other controls for EKS SOC Type 2.&lt;/p&gt;
&lt;p&gt;For container security best practices, see our guide on &lt;a href="https://blog.pytoshka.me/en/post/container-image-security-with-wazuh-and-trivy/"&gt;Container Image Security with Wazuh and Trivy&lt;/a&gt;.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="cc3-risk-assessment"&gt;
 CC3: Risk Assessment
 &lt;a class="header-anchor" href="#cc3-risk-assessment" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;hr&gt;
&lt;h3 id="eks-specific-risk-assessment"&gt;
 EKS-Specific Risk Assessment
 &lt;a class="header-anchor" href="#eks-specific-risk-assessment" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;p&gt;Identify, evaluate, and document security, operational, and compliance risks specific to Amazon EKS clusters and workloads to ensure that appropriate controls are implemented, monitored, and improved in alignment with SOC 2 Trust Services Criteria.&lt;/p&gt;</description></item><item><title>Boosting Container Image Security Using Wazuh and Trivy</title><link>https://blog.pytoshka.me/en/post/container-image-security-with-wazuh-and-trivy/</link><pubDate>Fri, 28 Mar 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/container-image-security-with-wazuh-and-trivy/</guid><description>&lt;p&gt;This article draws inspiration from the &lt;a href="https://wazuh.com/blog/container-image-security-with-wazuh-and-trivy/"&gt;Wazuh blog post&lt;/a&gt; on enhancing container image security with Wazuh and Trivy.&lt;/p&gt;
&lt;p&gt;Containerization has revolutionized software development and deployment, offering scalability and efficiency.&lt;/p&gt;
&lt;p&gt;However, this agility can introduce security risks if container images aren&amp;rsquo;t properly secured.&lt;/p&gt;
&lt;p&gt;Vulnerabilities within these images can expose your entire system to threats. This is where the combined power of Wazuh and Trivy comes in.&lt;/p&gt;
&lt;p&gt;These open-source tools provide a comprehensive solution for boosting your container image security, ensuring your applications are protected from the ground up.&lt;/p&gt;</description></item><item><title>RAG for Wazuh Documentation: Step-by-Step Guide, Part 2</title><link>https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-2/</link><pubDate>Wed, 05 Mar 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-2/</guid><description>&lt;p&gt;&lt;strong&gt;Related Reading:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-1/"&gt;Wazuh Integration with Ollama Series&lt;/a&gt; - Learn how to integrate Wazuh with Ollama&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/"&gt;Wazuh LLM Security Event Analysis&lt;/a&gt; - Specialized model for Wazuh events&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="prerequisites-and-environment-setup"&gt;
 Prerequisites and Environment Setup
 &lt;a class="header-anchor" href="#prerequisites-and-environment-setup" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;For local RAG development, ensure you have the following requirements:&lt;/p&gt;</description></item><item><title>RAG for Wazuh Documentation: Step-by-Step Guide, Part 1</title><link>https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-1/</link><pubDate>Sun, 02 Mar 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-1/</guid><description>&lt;h2 id="introduction-to-rag"&gt;
 Introduction to RAG
 &lt;a class="header-anchor" href="#introduction-to-rag" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Retrieval-Augmented Generation (&lt;strong&gt;RAG&lt;/strong&gt;) is a method that allows the use of information from various sources to generate more accurate and useful responses to questions.&lt;/p&gt;</description></item><item><title>Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 4)</title><link>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-4/</link><pubDate>Sat, 01 Mar 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-4/</guid><description>&lt;h2 id="continuing-the-series-integrating-a-wazuh-cluster-with-ollama---part-4-configuration-and-implementation"&gt;
 Continuing the Series: Integrating a Wazuh Cluster with Ollama - Part 4. Configuration and Implementation
 &lt;a class="header-anchor" href="#continuing-the-series-integrating-a-wazuh-cluster-with-ollama---part-4-configuration-and-implementation" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Related:&lt;/strong&gt; Check out our &lt;a href="https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/"&gt;Wazuh LLM fine-tuned model&lt;/a&gt; for specialized security event analysis.&lt;/p&gt;</description></item><item><title>Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 3)</title><link>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-3/</link><pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-3/</guid><description>&lt;h2 id="wazuh-and-ollama-part-3-creating-integration-between-your-wazuh-cluster-and-ollama"&gt;
 Wazuh and Ollama: Part 3. Creating Integration Between Your Wazuh Cluster and Ollama
 &lt;a class="header-anchor" href="#wazuh-and-ollama-part-3-creating-integration-between-your-wazuh-cluster-and-ollama" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Wazuh offers vast and nearly limitless possibilities for integration with various systems. Even if a specific feature is missing, you can always create your own custom integration.&lt;/p&gt;</description></item><item><title>Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 2)</title><link>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-2/</link><pubDate>Wed, 26 Feb 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-2/</guid><description>&lt;h2 id="wazuh-and-ollama-part-2-deploying-the-wazuh-cluster"&gt;
 Wazuh and Ollama: Part 2. Deploying the Wazuh Cluster
 &lt;a class="header-anchor" href="#wazuh-and-ollama-part-2-deploying-the-wazuh-cluster" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Now it&amp;rsquo;s time to set up &lt;strong&gt;Wazuh&lt;/strong&gt;, which we will integrate with &lt;strong&gt;Ollama&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Enhancing Wazuh with Ollama: Cybersecurity Boost (Part 1)</title><link>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-1/</link><pubDate>Mon, 24 Feb 2025 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-1/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Welcome to the first part of our guide on enhancing &lt;strong&gt;Wazuh&lt;/strong&gt; with &lt;strong&gt;Ollama&lt;/strong&gt;!&lt;/p&gt;</description></item><item><title>Topic Clusters &amp; Content Organization</title><link>https://blog.pytoshka.me/en/page/topic-clusters/</link><pubDate>Tue, 24 Dec 2024 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/page/topic-clusters/</guid><description>&lt;h1 id="topic-clusters"&gt;
 Topic Clusters
&lt;/h1&gt;&lt;p&gt;This page organizes our content into thematic clusters to improve navigation and SEO performance.&lt;/p&gt;
&lt;h2 id="wazuh-security-platform"&gt;
 Wazuh Security Platform
 &lt;a class="header-anchor" href="#wazuh-security-platform" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;h3 id="core-wazuh-integration-series"&gt;
 Core Wazuh Integration Series
 &lt;a class="header-anchor" href="#core-wazuh-integration-series" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-1/"&gt;Integrating Wazuh with Ollama: Part 1&lt;/a&gt; - AI-powered security monitoring&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-2/"&gt;Integrating Wazuh with Ollama: Part 2&lt;/a&gt; - Advanced configuration&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-3/"&gt;Integrating Wazuh with Ollama: Part 3&lt;/a&gt; - Automation workflows&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-4/"&gt;Integrating Wazuh with Ollama: Part 4&lt;/a&gt; - Production deployment&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/local-ollama-in-the-wazuh-dashboard-for-llm-powered-insights/"&gt;Ollama in Wazuh Dashboard: AI Security Analysis&lt;/a&gt; - Local LLM assistant in Wazuh Dashboard&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="wazuh--aws-bedrock--mcp"&gt;
 Wazuh + AWS Bedrock + MCP
 &lt;a class="header-anchor" href="#wazuh--aws-bedrock--mcp" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-1/"&gt;Wazuh + AWS Bedrock: Part 1 - ML Commons + Bedrock Connector&lt;/a&gt; - Conversational agent with PPLTool in Wazuh Dashboard&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-aws-bedrock-mcp-part-2/"&gt;Wazuh MCP Server: Part 2 - Claude Desktop + OpenSearch&lt;/a&gt; - MCP server in Docker for alert analysis via Claude Desktop&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="wazuh-llm-models"&gt;
 Wazuh LLM Models
 &lt;a class="header-anchor" href="#wazuh-llm-models" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/"&gt;Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis&lt;/a&gt; - Specialized LLM for Wazuh events&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/security-ai-models/"&gt;Two LLM Security Assistants for Wazuh and AWS Analysis&lt;/a&gt; - Fine-tuned models for security analysis&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="wazuh-documentation--rag"&gt;
 Wazuh Documentation &amp;amp; RAG
 &lt;a class="header-anchor" href="#wazuh-documentation--rag" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-1/"&gt;Applying RAG for Wazuh Documentation: Part 1&lt;/a&gt; - RAG implementation&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-2/"&gt;Applying RAG for Wazuh Documentation: Part 2&lt;/a&gt; - Advanced techniques&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="wazuh-integrations"&gt;
 Wazuh Integrations
 &lt;a class="header-anchor" href="#wazuh-integrations" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-mark-integration/"&gt;How to Set Up a Custom Integration between Wazuh and MARK&lt;/a&gt; - MARK integration guide&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/container-image-security-with-wazuh-and-trivy/"&gt;Boosting Container Image Security Using Wazuh and Trivy&lt;/a&gt; - Container security&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="wazuh-static-analysis-series"&gt;
 Wazuh Static Analysis Series
 &lt;a class="header-anchor" href="#wazuh-static-analysis-series" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-static-analysis-decoders/"&gt;Part 1: Static Analysis Tool for Wazuh Decoder XML Files&lt;/a&gt; - Automated decoder validation and quality enforcement&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-static-analysis-rules/"&gt;Part 2: Wazuh Rule Static Analysis: Linter Evolution&lt;/a&gt; - Rule validation, cross-type checking, and architectural evolution&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="wazuh-community"&gt;
 Wazuh Community
 &lt;a class="header-anchor" href="#wazuh-community" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-ambassador-announcement/"&gt;Joining the Wazuh Ambassador Program&lt;/a&gt; - Community involvement and contributions&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/aws-community-builder/"&gt;From Wazuh Ambassador to AWS Community Builder&lt;/a&gt; - Growing in open-source communities&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="enterprise-compliance--security"&gt;
 Enterprise Compliance &amp;amp; Security
 &lt;a class="header-anchor" href="#enterprise-compliance--security" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;h3 id="aws-eks-security--compliance"&gt;
 AWS EKS Security &amp;amp; Compliance
 &lt;a class="header-anchor" href="#aws-eks-security--compliance" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-1/"&gt;Amazon EKS SOC 2 Type II Compliance Checklist Part 1&lt;/a&gt; - Compliance fundamentals&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-2/"&gt;Amazon EKS SOC 2 Type II Compliance Checklist Part 2&lt;/a&gt; - Advanced controls&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="container--kubernetes-security"&gt;
 Container &amp;amp; Kubernetes Security
 &lt;a class="header-anchor" href="#container--kubernetes-security" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/container-image-security-with-wazuh-and-trivy/"&gt;Boosting Container Image Security Using Wazuh and Trivy&lt;/a&gt; - Vulnerability scanning&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/amazon-eks-soc2-type-ii-compliance-checklist-part-1/"&gt;Amazon EKS SOC 2 Type II Compliance Checklist Part 1&lt;/a&gt; - EKS security&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="security-research--infrastructure"&gt;
 Security Research &amp;amp; Infrastructure
 &lt;a class="header-anchor" href="#security-research--infrastructure" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;h3 id="research-infrastructure"&gt;
 Research Infrastructure
 &lt;a class="header-anchor" href="#research-infrastructure" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/ml-threat-intelligence-honeypot-datasets/"&gt;Building ML-Powered Threat Intelligence with Honeypot Datasets&lt;/a&gt; - ML threat detection&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="advanced-security-tools"&gt;
 Advanced Security Tools
 &lt;a class="header-anchor" href="#advanced-security-tools" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/meet-mark/"&gt;Mitigation Anomaly Revelation Keeper (MARK)&lt;/a&gt; - AI-powered threat analysis&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-mark-integration/"&gt;How to Set Up a Custom Integration between Wazuh and MARK&lt;/a&gt; - Integration guide&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="machine-learning--ai-security"&gt;
 Machine Learning &amp;amp; AI Security
 &lt;a class="header-anchor" href="#machine-learning--ai-security" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;h3 id="ml-powered-security-analytics"&gt;
 ML-Powered Security Analytics
 &lt;a class="header-anchor" href="#ml-powered-security-analytics" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/ml-threat-intelligence-honeypot-datasets/"&gt;Building ML-Powered Threat Intelligence with Honeypot Datasets&lt;/a&gt; - ML threat detection with Hugging Face&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-integration-with-ollama-part-1/"&gt;Integrating Wazuh with Ollama: Part 1&lt;/a&gt; - AI-enhanced SIEM&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/"&gt;Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis&lt;/a&gt; - Specialized security LLM&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="ai-driven-threat-detection"&gt;
 AI-Driven Threat Detection
 &lt;a class="header-anchor" href="#ai-driven-threat-detection" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-1/"&gt;Applying RAG for Wazuh Documentation: Part 1&lt;/a&gt; - RAG for security documentation&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-documentation-rag-part-2/"&gt;Applying RAG for Wazuh Documentation: Part 2&lt;/a&gt; - Advanced RAG techniques&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="specialized-security-llms"&gt;
 Specialized Security LLMs
 &lt;a class="header-anchor" href="#specialized-security-llms" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/security-ai-models/"&gt;Two LLM Security Assistants for Wazuh and AWS Analysis&lt;/a&gt; - Fine-tuned Llama models for security&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pytoshka.me/en/post/wazuh-llama-security-event-analysis/"&gt;Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis&lt;/a&gt; - Wazuh-specific LLM&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="tech-reflections--satire"&gt;
 Tech Reflections &amp;amp; Satire
 &lt;a class="header-anchor" href="#tech-reflections--satire" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;h3 id="the-llm-apocalypse-trilogy"&gt;
 The LLM Apocalypse Trilogy
 &lt;a class="header-anchor" href="#the-llm-apocalypse-trilogy" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h3&gt;&lt;p&gt;A satirical series exploring AI dependency through post-apocalyptic storytelling:&lt;/p&gt;</description></item><item><title>How to Set Up a Custom Integration between Wazuh and MARK</title><link>https://blog.pytoshka.me/en/post/wazuh-mark-integration/</link><pubDate>Tue, 17 Dec 2024 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/wazuh-mark-integration/</guid><description>&lt;h2 id="introduction"&gt;
 Introduction
 &lt;a class="header-anchor" href="#introduction" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Integrating Wazuh SIEM with MARK (Mitigation Anomaly Revelation Keeper) enables automated threat detection and enriches security alerts with intelligence data. This guide walks you through setting up a custom integration for enhanced SOC operations.&lt;/p&gt;</description></item><item><title>Mitigation Anomaly Revelation Keeper(MARK)</title><link>https://blog.pytoshka.me/en/post/meet-mark/</link><pubDate>Wed, 04 Dec 2024 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/post/meet-mark/</guid><description>&lt;h2 id="overview"&gt;
 Overview
 &lt;a class="header-anchor" href="#overview" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;&lt;a href="https://mark.opennix.org/"&gt;Mitigation Anomaly Revelation Keeper (MARK)&lt;/a&gt; is an advanced security platform designed to proactively defend against cyber threats by leveraging cutting-edge IP reputation analysis and machine learning. With a focus on identifying and neutralizing malicious actors, MARK offers unparalleled insight into attacker behavior and statistical trends to fortify your organization&amp;rsquo;s defenses.&lt;/p&gt;</description></item><item><title>Meet me</title><link>https://blog.pytoshka.me/en/page/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><author>ping@pytoshka.me (pyToshka)</author><guid>https://blog.pytoshka.me/en/page/about/</guid><description>&lt;h2 id="professional-summary"&gt;
 &lt;strong&gt;Professional Summary&lt;/strong&gt;
 &lt;a class="header-anchor" href="#professional-summary" aria-label="Permalink to this section"&gt;
 &lt;svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
 &lt;path d="M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.65 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z" fill="currentColor"/&gt;
 &lt;/svg&gt;
 &lt;/a&gt;
&lt;/h2&gt;&lt;p&gt;Senior Site Reliability Engineer with 14+ years building, scaling, and maintaining critical infrastructure across diverse technology environments.&lt;/p&gt;</description></item></channel></rss>