Bug Fixes for NetEye 4.27
We fixed a bug when generating resource reports that did not correctly account for customer permissions For NetEye 4.27 we updated the following packages:
Read MoreWe fixed a bug when generating resource reports that did not correctly account for customer permissions For NetEye 4.27 we updated the following packages:
Read MoreIn this bug fix we managed to solve the problem regarding the checkbox usage. The bug we fixed was forcing the checkboxes found in the SLM – Availability Contracts manager status to be true regardless the user choice. For NetEye 4.27 we updated the following packages:
Read MoreWe fixed a bug that was doubling the menu entries for Host Problems and Service Problems on customproblemview module when a host or service filter was applied on the user role. For NetEye 4.27 we updated the following packages:
Read MoreThe Initial Message The last few days have been quite hectic with regard to cyber security in the industrial systems sector. The frenzy of these days began on January 11 with this message that appeared on the Telegram channel (https://t.me/GhostSecc) of the GhostSec group: The message was accompanied by a couple of screenshots: So are…
Read MoreOverview I think there are different ways companies use to achieve the purpose of making their own software more secure, for example paying other dedicated companies to do penetration tests. Our approach was the same, initially…the most obvious problems were found and fixed. But there was something we weren’t buying. We weren’t satisfied, we knew…
Read MoreWe fixed a bug that did not allow SLM resource reports to be generated correctly for sending via email. We have updated Icinga Web 2 with the latest bug fix release that brings security fixes. For NetEye 4.27 we updated the following packages:
Read MoreGartner said it in 2020, but how is it going? Lets’ take a look at some statistics… The pandemic has forced companies to adopt an Agile approach, especially in order to improve communication among distributed teams. Teams in the software industry have seen an increase in Agile practices from 37% to 86%2. Therefore, most companies…
Read MoreTo identify a NetEye system globally, a unique NUUID (NetEye Universal Unique IDentifier) will be assigned to each NetEye Node. Red Hat Subscriptions are now bound to the NUUID.The feature has been originally released in NetEye 4.27 and is now backported for NetEye versions 4.26, 4.25, and 4.24. For more information on the registration of…
Read MoreIt’s more and more common to receive emails asking for credentials. They usually say that there’s some kind of issue that can only be solved by accessing the involved service using the link inside the message text. In most cases these emails are malicious, intended to steal users’ or employees’ credentials and gain access to…
Read MoreCybersecurity is a discipline that deals with protecting computer systems and digital data from attacks and security breaches. With the increasing use of technology and dependence on computer systems in everyday life, cybersecurity is becoming increasingly important. But what are the risks for those who don’t know how to protect themselves? Online security risks can…
Read MoreI recently had to parse the JSON-RPC 2.0 standard and ran into the following problem: The standard requires the field “jsonrpc”: “2.0” in the JSON itself, and I wanted to validate that with Serde to ensure the message conforms to the standard. On the other hand I don’t need the field in the actual struct,…
Read MoreWe’re at the end of the year again and it’s time to draw up the famous list of good resolutions for the coming year. I’m talking about good and working resolutions, the ones relating to good non-working resolutions is always very difficult to respect. I could challenge many of you to state for the record…
Read MoreWe fixed the default configuration paths used to send SMS messages. For NetEye 4.27 we updated the following packages:
Read MoreAsset management/CMDB tools play (or should play!) a central role in IT operations and management, gathering data from hardware assets on contracts, software licenses, network configurations, tickets and many more. The key task is to keep all this data consistent and up to date. Rigor in manual data insertion and the careful integration of automation…
Read MoreIn December 2021 Microsoft revealed two vulnerabilities concerning an Active Directory Domain Services privilege elevation, classified as CVE-2021-42278 and CVE-2021-42287. By combining the two exploits in the so-called noPac attack, a malicious actor could perform a privilege escalation by impersonating the Domain Administrator after starting out as a standard user. This would lead to a…
Read More