Knowledge Base

SYARA Blog

Tutorials, case studies, and research on AI-powered threat detection

🚀
January 15, 2025 5 min read

Getting Started with SYARA

Install SYARA and write your first semantic detection rule in under 10 minutes — covering strings, similarity, and key-value syntax.

Read more →
🛡️
January 20, 2025 8 min read

Detecting Prompt Injection Attacks

A comprehensive guide to building semantic rules that detect prompt injection attempts with high accuracy using SBERT and classifiers.

Read more →
January 25, 2025 10 min read

Semantic Rules vs Traditional YARA

Why semantic matching catches dramatically more threats than keyword-based detection in the GenAI era.

Read more →
🎣
February 1, 2025 12 min read

Building a Phishing Detection System

Combine text analysis and perceptual image hashing to detect phishing websites with SYARA's multi-modal approach.

Read more →
🔧
February 5, 2025 15 min read

Creating Custom Semantic Matchers

Extend SYARA with your own embedding models and matching algorithms. Register via YAML or the Python ConfigManager API.

Read more →
🖼️
February 10, 2025 7 min read

Detecting Malicious Images with PHash

Use perceptual hashing to identify near-duplicate malware screenshots, phishing logos, and malicious QR codes with the phash rule section.

Read more →
🤖
February 15, 2025 10 min read

Leveraging LLMs for Threat Detection

Integrate GPT-4, Google Gemini, or local Ollama models into your detection pipeline for zero-day attack identification.

Read more →
💰
February 20, 2025 6 min read

Optimizing Detection Costs

Best practices for minimizing API costs while maintaining high detection rates with multi-layered, cost-ordered rules.

Read more →
🔓
February 25, 2025 12 min read

Case Study: Detecting Jailbreak Attempts

Real-world analysis of detecting DAN mode and other jailbreak techniques across semantic similarity and LLM evaluation layers.

Read more →

Want to Contribute?

Share your own tutorials, case studies, or research with the community