Blog Entries

23. 07. 2025 Gianluca Piccolo Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes for GLPI We have updated GLPI to the latest bugfix version to resolve some security fixes. List of updated packages To solve the aforementioned issues, the following packages have been updated for NetEye 4.42:

Read More
18. 07. 2025 Tobias Goller Automation, Cloud

Running SOS Berlin JobScheduler in Containers: A Step Toward Cloud-Native Scheduling

As enterprises move toward containerization and microservices, traditional job schedulers are often left behind. However, many organizations still rely on tried-and-true tools like SOS Berlin’s JobScheduler (now known as JADE under the JOC Cockpit umbrella). The good news? With a bit of engineering effort, you can bring JobScheduler into the world of containers. In this…

Read More
18. 07. 2025 Marco Berlanda Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes for icingaweb2-module-tornado We’ve updated to the latest bugfix version to resolve an issue with the WITH extractor rule, where Regex values appeared empty in the UI when the corresponding Group Match Index was set to NULL (even though the values were correctly stored in the configuration). We also addressed a bug that was preventing…

Read More
17. 07. 2025 William Calliari Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes for icinga2 We have updated icinga2 to the latest bugfix version to resolve CVE-2025-48057. List of updated packages To solve the aforementioned issues, the following packages have been updated for NetEye 4.42:

Read More
07. 07. 2025 Damiano Chini Bug Fixes, NetEye

NetEye Security Advisory

Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic An update for the kibana package is now available for NetEye 4. Security Fix for NetEye 4.41 CVSSv3.1: 9.9 (Critical) – CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H For a detailed overview of the security issue(s), including the impact, CVSS score,…

Read More
03. 07. 2025 Federico Corona Red Team, SEC4U

Security Assessment: More Than a Test… A Training Opportunity for the IT Team

When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But reducing these activities to a mere “test” means missing a key strategic opportunity: turning every assessment into the possibility of helping the internal IT team grow…

Read More
03. 07. 2025 Alessandro Paoli NetEye, Unified Monitoring

Configuring Keycloak with LDAP and TLS Certificate (LDAPS) in NetEye

In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal or self-signed Certificate Authorities. This is especially useful in enterprise environments using Active Directory or a centralized LDAP server. This configuration is particularly relevant for…

Read More
02. 07. 2025 Daniel Degasperi Blue Team, Log-SIEM, SEC4U

Discovery and Credential Access via Kerberos & NTLM: A Detection-Focused Approach

Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during malicious activities. This article explains how to detect suspicious behaviors related to Domain Account Discovery and Credential Access, specifically focusing on Enumeration, Brute Force, and Password Spraying attempts via NTLM…

Read More
30. 06. 2025 Fabrizio Dovesi Atlassian, Service Management

Where ITIL® 4 Meets Atlassian: Elevating IT Service Management

An overview of the joint Axelos and Atlassian paper on integrating ITIL® 4 into modern ITSM workflows. ITIL® 4 Meets Agile: A New Era of ITSM with Atlassian and AXELOS In today’s fast-paced digital world, IT is no longer just a back-office function. It’s a central enabler of business innovation and value creation. As technologies…

Read More
30. 06. 2025 Alessandro Taufer DevOps, Kubernetes

How to Replicate Sealed Secrets in Multiple Namespaces

One of the most annoying aspects of using Sealed Secrets is their encryption design. They are tightly coupled to the namespace and name of the target Secret, meaning any changes to either require re-encrypting the Sealed Secret. This rigidity complicates workflows, especially when you need to duplicate or promote Secrets across environments. It breaks the…

Read More
30. 06. 2025 Csaba Remenar NetEye, Unified Monitoring

Alertmanager Alert Filtering Rules – Effective Alert Management in Practice

Lately, we’ve been working extensively on integrating Prometheus alerts into NetEye. In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service” structure. Our task is to “translate” these alerts into “hosts” and their corresponding…

Read More
30. 06. 2025 Paolo Seghetti NetEye, Unified Monitoring

Cron Job Monitoring with Tornado (Part 2)

In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let’s continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then open the processing tree and select Edit mode On. Add a filter with an appropriate…

Read More
30. 06. 2025 Giuseppe Di Garbo Atlassian, Service Management

Creating Jira Service Management Requests from a Public Website? Here’s the Secure, No-API Way

If you’ve ever tried integrating an external system or website with Jira Service Management (JSM), you’ve probably hit one or more roadblocks, especially when it comes to creating requests on behalf of end users without using the default Jira Service Management portal. The good news? You don’t need to hand over admin access or build…

Read More
30. 06. 2025 Charles Callaway Documentation

Making Your Own Video Tutorials, Part 19: An Editing Workflow

Welcome back to our ongoing series on creating online IT tutorial videos. The last two times we talked about speeding up your graphics, and how the entire workflow works from writing all the way to the final product. Today let’s do a deep dive on just the Editing process: once you have your digital resources…

Read More
30. 06. 2025 Mirko Morandini Asset Management, Unified Monitoring

Das neue GLPI 11 – offizielle deutsche Vorstellung [DE]

Blog auf DEUTSCH. Una versione ITALIANA seguirà fra poco! [Disclaimer: this blog is deliberatively written in German, an Italian version will follow. WürthPhoenix is Gold partner for GLPI for Italy and for the German Market (Germany, Austria, Switzerland, South Tyrol), thus with this blog article we engage the German (and Italian) readers.] Am 26.6 durfte…

Read More

Archive