Cyber Security
·9 mins
To analyze log data using OpenSearch the logs need to be collected and processed first. This post shows how to collect, parse, filter and ingest logs from Linux servers into OpenSearch with Fluent-Bit.
A large database full with the latest cyber intelligence info like threat reports, news articles and more that can easily be queried using an LLM? Sounds expensive but can be achieved with open-source components for free!
·7 mins
This post is about safety alignment bypasses like prompt injections or jailbreaks, that make LLms ignore their guardrails.
·2 mins
This new series covers security risks in AI systems in depth. From prompt injections, to supply chain attacks and risks of agentic AI.
