Blog Entries

31. 07. 2025 Oscar Zambotti Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fix for Tornado Webhook collector We have fixed an issue where large incoming requests to the Webhook Collector could cause the system to become unresponsive over time. List of updated packages To solve the aforementioned issues, the following packages have been updated for NetEye 4.42:

Read More
31. 07. 2025 Emil Fazzi Bug Fixes, NetEye

Bug Fixes for NetEye 4.43

Fixes for Elastic Stack Improved wait for cluster status during updates / upgrades When restarting the Elasticsearch cluster during the NetEye update / upgrade procedure, is it possible let the restart procedure going even if the cluster has a “yellow” status. The check on the cluster status has been improved to allow at least the…

Read More
24. 07. 2025 Davide Zeni Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fix for Previously, database updates would fail if the GLPI DRBD resource was active on a node other than the primary, due to an inability to locate the necessary database configuration within the DRBD-managed volume. This fix ensures that GLPI can now successfully access its database configuration and perform updates irrespective of the active DRBD…

Read More
23. 07. 2025 Gianluca Piccolo Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes for GLPI We have updated GLPI to the latest bugfix version to resolve some security fixes. List of updated packages To solve the aforementioned issues, the following packages have been updated for NetEye 4.42:

Read More
18. 07. 2025 Tobias Goller Automation, Cloud

Running SOS Berlin JobScheduler in Containers: A Step Toward Cloud-Native Scheduling

As enterprises move toward containerization and microservices, traditional job schedulers are often left behind. However, many organizations still rely on tried-and-true tools like SOS Berlin’s JobScheduler (now known as JADE under the JOC Cockpit umbrella). The good news? With a bit of engineering effort, you can bring JobScheduler into the world of containers. In this…

Read More
18. 07. 2025 Marco Berlanda Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes for icingaweb2-module-tornado We’ve updated to the latest bugfix version to resolve an issue with the WITH extractor rule, where Regex values appeared empty in the UI when the corresponding Group Match Index was set to NULL (even though the values were correctly stored in the configuration). We also addressed a bug that was preventing…

Read More
17. 07. 2025 William Calliari Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes for icinga2 We have updated icinga2 to the latest bugfix version to resolve CVE-2025-48057. List of updated packages To solve the aforementioned issues, the following packages have been updated for NetEye 4.42:

Read More
07. 07. 2025 Damiano Chini Bug Fixes, NetEye

NetEye Security Advisory

Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic An update for the kibana package is now available for NetEye 4. Security Fix for NetEye 4.41 CVSSv3.1: 9.9 (Critical) – CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H For a detailed overview of the security issue(s), including the impact, CVSS score,…

Read More
03. 07. 2025 Federico Corona Red Team, SEC4U

Security Assessment: More Than a Test… A Training Opportunity for the IT Team

When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But reducing these activities to a mere “test” means missing a key strategic opportunity: turning every assessment into the possibility of helping the internal IT team grow…

Read More
03. 07. 2025 Alessandro Paoli NetEye, Unified Monitoring

Configuring Keycloak with LDAP and TLS Certificate (LDAPS) in NetEye

In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal or self-signed Certificate Authorities. This is especially useful in enterprise environments using Active Directory or a centralized LDAP server. This configuration is particularly relevant for…

Read More
02. 07. 2025 Daniel Degasperi Blue Team, Log-SIEM, SEC4U

Discovery and Credential Access via Kerberos & NTLM: A Detection-Focused Approach

Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during malicious activities. This article explains how to detect suspicious behaviors related to Domain Account Discovery and Credential Access, specifically focusing on Enumeration, Brute Force, and Password Spraying attempts via NTLM…

Read More

Archive