Expanding Security Log Enrichment Beyond Threat Intelligence