Blog Entries

23. 09. 2021 Massimo Giaimo Exposure Assessment, SEC4U

Exposure Assessment: straight to the point!

In this second post on the Exposure Assessment topic we start from the end! We have just put into production, within our OSINT & Cyber Threat Intelligence SATAYO platform, an internal search engine that aims to simplify the research of evidences within the platform itself. This is a development that has been particularly requested by…

Read More
02. 09. 2021 Massimo Giaimo Exposure Assessment, SEC4U

Exposure Assessment: Know the Attack Surface

This is the first in a series of articles that aims to technically describe the various objects collected within our Exposure Assessment activity, based on our OSINT & Cyber Threat Intelligence SATAYO platform. Its functionalities and the elements make it a fundamental tool for all organizations wishing to continuously monitor their exposure within public domain…

Read More
09. 07. 2021 Massimo Giaimo Blue Team, SEC4U

Analysis of a Dark Web site

In this article we will see together how to perform an analysis of a site present on the Dark Web and more precisely of a site present within the Tor network. Our point of reference will be the site of the Avos ransomware gang, which has just started its cyber criminal activity a few weeks…

Read More
02. 07. 2021 Massimo Giaimo Red Team, SEC4U

PrintNightmare – A Good Opportunity for the Red Team

The goal of this article is to present the point of view of the Red Team SEC4U at Würth Phoenix regarding the ominous PrintNightMare vulnerability that has been talked about so much in recent days. A summary for those who did not receive hardly any information about this: it’s a weakness in the Microsoft Windows…

Read More
12. 03. 2021 Massimo Giaimo Blue Team, Log-SIEM, SEC4U

Microsoft Exchange 0-Day: Let’s Look at the Facts!

I’m writing this article with the goal of summarizing the events of recent days concerning the zero-day vulnerability that has struck Microsoft Exchange installations, and to provide some useful information to help you understand how the attack began, how it developed, and what we should expect in the immediate future. First of all, a quick…

Read More
17. 04. 2020 Massimo Giaimo Asset Management, NetEye

Integrating phpIPAM into NetEye 4

Introduction In this article I will show you how to use phpIPAM (https://phpipam.net/), an open source IP address management project, as an import source database for NetEye. The goal is to use hosts you have already configured separately in phpIPAM and import them into NetEye. This allows you to take advantage of the powerful and…

Read More
03. 09. 2019 Massimo Giaimo Events, Log-SIEM, NetEye, Service Management

NetEye SIEM: The Attacker’s Point of View

In our ethical hacking activities there are three different phases in which we clash with the themes of SIEM: PLANNING – The phase prior to the activity where we define the scope of engagement, be it for a Vulnerability Assessment, a Penetration Test or simulating a real attack CHALLENGE – The activity, corresponding to Vulnerability…

Read More
19. 09. 2017 Massimo Giaimo Information Security Operations Center

Vittime di attacchi cibernetici? NetEye e Kibana possono aiutarvi!

La sicurezza informatica rientra tra le principali priorità di ogni CIO. Gli attacchi cibernetici sono ormai una realtà che va affrontata quotidianamente. Sempre più aziende rientrano tra le vittime dei cosiddetti cybercrime dovendo, loro malgrado, pagarne le conseguenze in termini finanziari, operativi e di reputazione. Ecco perché cercare di strutturare meglio le difese, aumentando l’efficienza…

Read More
19. 09. 2017 Massimo Giaimo Information Security Operations Center

Do you want to prevent cyber-attacks? NetEye and Kibana can help.

IT security is one of the highest priorities for every CIO. Cyber-attacks are now a reality that we must deal with on a daily basis. More and more organizations have been the victims of so-called cybercrimes that are the cause of financial losses, operational problems and consequences to the company’s reputation. That is why trying…

Read More
19. 09. 2017 Massimo Giaimo Log-SIEM, NetEye, NetEye, NetEye

Do you want to prevent cyber-attacks? NetEye and Kibana can help.

IT security is one of the highest priorities for every CIO. Cyber-attacks are now a reality that we must deal with on a daily basis. More and more organizations have been the victims of so-called cybercrimes that are the cause of financial losses, operational problems and consequences to the company’s reputation. That is why trying…

Read More
13. 12. 2016 Massimo Giaimo Uncategorized

Überwachung eines Remote Banking Dienstes mit Alyvix und NetEye

Massimo Giaimo, Senior System & Netzwerk Administrator bei IBT, teilt seine Erfahrungen mit Alyvix und NetEye. Welches sind die jüngsten und bedeutendsten Veränderungen im Bereich Application Monitoring? Jahrelang haben IT-Abteilungen Performance Monitoring Strategien implementiert, denen primär die Überwachung der System-Uptime zugrunde lag. Erst in letzter Zeit haben Unternehmen erkannt, dass es nicht immer ausreicht die Verfügbarkeit der…

Read More
13. 12. 2016 Massimo Giaimo Uncategorized

Remote Banking Monitoring con Alyvix e NetEye

Massimo Giaimo, Senior System & Network Administrator in IBT, condivide la propria esperienza d’uso di Alyvix e NetEye. Quali sono i cambiamenti recenti più significativi dal punto di vista del monitoraggio di applicazioni? Per decenni i reparti IT si sono occupati principalmente del controllo delle prestazioni attraverso gli uptime dei sistemi che erogano i servizi…

Read More
13. 12. 2016 Massimo Giaimo Events, NetEye, NetEye, NetEye, Real User Experience, Real User Experience, Real User Experience, Visual Synthetic Monitoring

Remote banking monitoring with Alyvix and NetEye

Massimo Giaimo, Senior System & Network Administrator at IBT, shares his experience with Alyvix and NetEye. What are the most recent significant changes in the application monitoring? For decades, IT departments have mainly implemented performance-monitoring strategies through the control of the uptime of the systems. Only in recent years, companies realized that is not sufficient…

Read More

Archive