Exposure Assessment: The Best Way to Easily Discover a Target’s Infrastructure
Overview of discovering hostnames and IP addresses using OSINT techniques.
Read MoreOverview of discovering hostnames and IP addresses using OSINT techniques.
Read MoreWe fixed a bug that caused a failed authentication of Alyvix sessions having some special characters in the password, due to an inconsistent encoding. Moreover, we fixed an issue related to the installation procedure of the feature modules packages on satellites, which under some circumstances was not marking the corresponding DNF group as installed. Furthermore,…
Read MoreAfter performing several migrations to NetEye 4, I realized that not all checks present on the old NetEye 3 could be migrated immediately. Sometimes for obsolete host systems on which the new Icinga 2 Agent could not be installed, or for dedicated check types for specific services, it was necessary to continue using our good…
Read MoreWelcome, today’s blog is dedicated to data breach analyses and evaluating their reliability. In an increasingly data-centric digital landscape, it’s crucial to delve into the complexities of data breaches and develop effective methods for determining the trustworthiness of the information they contain. In this blog, we’ll explore a professional approach to data breach analysis using…
Read MoreWe all know that NetEye can grant access to its Web Interface through local users, or through the use of LDAP queries that can filter and grant GUI access to users or groups of a given Active Directory domain. What I would like to explore today is the possibility of granting SSH access and elevating…
Read MoreThe n-queens problem is a common exercise in computer science. Legend has it that a mathematician once declared that women are like the queens in chess, you can’t put eight of them in a room without them trying to kill each other. This obviously isn’t true, and since I’m a feminist, but also a nerd,…
Read MoreAs technology continues to advance at an unprecedented pace, the financial sector faces increasing risks and challenges in safeguarding sensitive data and ensuring the security of critical systems. In response to this evolving threat landscape, the European Central Bank (ECB) and the European Union Agency for Cybersecurity (ENISA) introduced a groundbreaking framework known as TIBER-EU…
Read MoreWelcome to version 4.30 of our NetEye v4 Unified Monitoring Solution. In this release, NetEye goes to one of the most famous places in the Alps: the “Tre Cime di Lavaredo” or “Drei Zinnen”. They are considered among the best-known natural wonders in the world, as well as being one of the UNESCO World Heritage…
Read MoreGeneral Authentication via request-header backend We fixed a bug that did not allow the role to be associated with a user who was part of an LDAP group when the user logged in via the request-header backend. Tornado Tornado Director retry loop We fixed a bug that triggered the Tornado Director in a retry loop…
Read MoreIn order to visually test NetEye on browsers at each stage of development and before each release, we have a continuous integration (CI) step dedicated to Selenium testing. Selenium is a longtime open-source tool for browser automation; it’s a widely-used tool with a huge community of users. The framework is capable of automating and controlling…
Read MoreOn May 18th, an event organized by Würth Phoenix and sponsored by Atlassian was held in Verona. The event was targeted at both new companies and existing customers who were interested in leveraging the Atlassian solutions. The afternoon session focused on providing participants with valuable insights into Enterprise Service Management (ESM), a highly relevant topic…
Read MoreGiven the rapidly evolving business landscape, advancements in technology, and the increasing expectations of customers, companies must adopt a mindset of business agility, and Enterprise Service Management (ESM) represents a solution for companies striving to maintain competitiveness in the market. 💡 Enterprise Service Management is the extension of IT Service Management (ITSM) principles outside of the…
Read MoreWelcome, everyone to our second “Monthly Atlassian News”! Why are we doing this? You might know that the Atlassian website is so complete, that finding information can be a big challenge😵 So… we decided to do the dirty work for you and summarize all the latest features and news from the Atlassian ecosystem every two…
Read MoreMonitoring systems acquire information from various devices in different ways: API, SNMP, syslog, etc. One of the most important methods in Icinga-based systems like NetEye is the Icinga Agent. This agent is installed on each server and collects and sends information to the master NetEye node using secure protocols. When we work within a small…
Read MoreYou’ve probably watched a number of YouTube tutorials over the last 10 years, whether to help you with a specific task at work, to keep your IT skills refreshed, or even just to learn something new about one of your personal hobbies (no, we don’t want to hear about your favorite cat videos). So I’m…
Read More