Blog Entries

29. 09. 2025 Oscar Zambotti Front-end, Vue

Summoning Orval: Binding Backend and Frontend by Magic

When building modern web applications, type safety and API consistency are essential. Instead of manually writing API clients and models (and risking drift between backend and frontend), you can automate the process using OpenAPI and Orval. In this post, we’ll focus on how to generate TypeScript functions and interfaces using Orval, starting from an openapi.json…

Read More
29. 09. 2025 Mirko Morandini Asset Management, GLPI, Knowledge Management, Service Management

Getting the M(u)st out of GLPI

TLTR1: Did you pick all the sweet grapes that grew in your vineyard? They’re sweet, but they degrade faster than you think. Now, to give them long-lasting value, get the must out of it and put a lot of knowledge, time and effort to create a high-value wine! TLTR2: Do you have an automatically fed…

Read More
29. 09. 2025 Davide Spano Azure, Microsoft

Secure Access to Applications with Azure

One overarching goal in the IT industry is to enable authorized users to securely access company resources. The implementation that fulfills this general requirement will depend on several factors, some of which will become clear as the topic unfolds. This article gives a logical and historical overview of what Secure Access is, the use cases…

Read More
29. 09. 2025 Antonio Cerullo Microsoft

Migration from Windows 10 to Windows 11 for Enterprise Clients

Introduction With the End of Support (EOS) date for Windows 10 approaching (it’s set in fact for October 14, 2025), companies must urgently plan their transition to Windows 11, as Windows 10 will no longer receive security updates after that date. This means non-updated devices will be exposed to vulnerabilities and thus be non-compliant with…

Read More
26. 09. 2025 Simone Ragonesi AI, Artificial Intelligence, Offensive Security, Red Team

The Evolving Security Landscape of MCP

Introduction: What is MCP? The Model Context Protocol is an emerging open standard that defines how large language models and AI agents interact with external tools, services, and data sources. Instead of every AI provider building its own proprietary “tool calling” system, MCP provides a common protocol (typically over JSON-RPC) to expose capabilities such as…

Read More
25. 09. 2025 Mattia Codato CTF Writeups, Development, Events

Preparing for WP CTF 2025

Summer is over, autumn is here – and so is the most anticipated event of the year for cybersecurity students: WP CTF 2025. Every year, the WP CTF draws cybersecurity students hungry to learn, compete, and put their skills to the test. Our marketing team has been working for months to organize an incredible event,…

Read More
23. 09. 2025 Luigi Miazzo Bug Fixes, NetEye

Bug Fixes for NetEye 4.43

Satellite config creation in HA mode using zone names with whitespaces We’ve addressed an issue where running the neteye satellite config create for a satellite configured in HA mode having whitespaces in the Zone name prevented the procedure to successfully execute. List of updated packages To solve the issues mentioned above, the following packages have…

Read More
23. 09. 2025 Csaba Remenar NetEye

Minimizing Downtime: NetEye MariaDB Database Rebuild with Containers and Logical Backup

Familiar with the feeling when a critical system’s backup and recovery time is measured in hours? Operations teams rely heavily on the availability of monitoring data, so scheduling long periods of downtime is simply not an option. We recently faced this exact challenge: we had to schedule a multi-hour downtime because our MariaDB database had…

Read More
19. 09. 2025 Matteo Cipolletta NetEye

Native Monitoring of the Logstash Dead Letter Queue

When working with Logstash in production, one of the often-overlooked areas is the Dead Letter Queue (DLQ). This queue stores events that Logstash cannot process, usually due to parsing errors, mapping conflicts, or pipeline misconfigurations. While the DLQ is useful for troubleshooting, leaving it unmonitored can be dangerous: if it grows unnoticed, critical data might…

Read More
19. 09. 2025 Alessandro Taufer Development, DevOps

How to Debug Your Kernel Calls

Unexpected reboots, who doesn’t love them? A few weeks ago, we faced a problem that any platform engineer dreads: one of our nodes rebooted unexpectedly. The cause? The iDRAC watchdog forcefully terminated it. But what led iDRAC to decide it was time to shut down the node? A preliminary investigation concluded that there wasn’t any…

Read More
16. 09. 2025 Davide Sbetti DevOps, Kubernetes

Monitoring DBs through PMM: a Migration to OpenShift

Hi 😀 Today I’d like to explore with you a migration that we performed to a service that’s used internally to monitor the performance of various DBs, gathering data that’s especially useful for troubleshooting. This tool is the Percona Monitoring and Management (PMM) platform, which combines agents or direct access to various supported DBMS (MySQL,…

Read More
15. 09. 2025 Reinhold Trocker Log Management, Log-SIEM

Want to Manage a Large Elastic Agent Fleet?

Managing a large fleet of Elastic Agents efficiently requires careful planning and proactive strategies to ensure stability, scalability, and security. As a technical consultant, I’d like to present some key considerations to help organizations avoid common pitfalls and streamline their operations. 1. Avoid Trust Issues One of the most critical aspects of managing an extensive…

Read More
13. 09. 2025 Mirko Ioris Blue Team, SEC4U

A Practical Guide to Working with Windows Authentication Logs – Part 2

Welcome back for the second and last part of our journey into the jungle of Windows logs! In the first part we set out our goal – tracking admin authentications – and learned more about Windows, how authentication events are logged, and where can we focus to isolate the most accurate events. Today we’re going…

Read More
12. 09. 2025 Francesco Belacca Azure, Microsoft, Power Platform

Bulk-assigning Power Apps to Flow Owners

TL;DR. Owner assignment on the Power Platform via the UI requires a lot of clicks. I use a small, idempotent PowerShell 7+ script that assigns co-owners to many cloud flows across many environments using az tokens and Flow Admin REST APIs. It filters by name prefix, checks existing permissions, retries on throttling, and runs on…

Read More
11. 09. 2025 Andrea Mariani NetEye, PHP, Unified Monitoring

Using Keycloak to Secure Web Pages and Virtual Directories

While working on some internal tools, I needed secure access to a few PHP pages and virtual directories resources that, by default, didn’t have any built-in access control. Since NetEye already uses Keycloak as its authentication system, I decided to leverage it to handle login and user validation. This way I could avoid reinventing the…

Read More

Archive