Blog Entries

30. 06. 2025 Gabriele Cecco Atlassian

The Surprising Power of Email in a Modern ITSM World

In a world that’s constantly chasing the next big thing – AI-driven workflows, voice assistants, holograms (ok, maybe not quite yet) – email continues to quietly thrive. Yes, that humble, old-school communication tool is still shockingly relevant. And no, this isn’t a sponsored message from your email inbox. 😄 As consultants, we often talk about how some technologies evolve at…

Read More
27. 06. 2025 Davide Spano Azure, Microsoft

Secure Network Integration for Secrets in Microsoft Azure

Scenario: Introduction Think of an organization that maintains most of its IT infrastructure on Azure. It applies a segmentation strategy by branch office, where the assets underlying each regional branch office are deployed to their specific landing zone subscription, i.e. SUB-BRANCH-A, SUB-BRANCH-B, etc. The landing zones share the same Microsoft Entra ID Tenant as their…

Read More
27. 06. 2025 Gianluca Piccolo Bug Fixes, NetEye

Bug Fixes for NetEye 4.42

Fixes in NetEye Satellite upgrade to version 4.42 We have resolved a bug that occurred during the upgrade of NetEye Satellites to version 4.42. Specifically, these issues were associated with the GLPI procedures. List of updated packages To solve the aforementioned issues, the following packages have been updated for NetEye 4.42:

Read More
26. 06. 2025 Fabiana Pittalis Atlassian

Confused by Atlassian Teams, Groups, and Managed Teams? Here’s the Difference

If your company uses Atlassian tools like Jira or Confluence, you’ve likely encountered the terms Teams and Groups. At first glance, Teams and Groups might seem like the same thing – just different ways to organize people. But take a closer look, and you’ll quickly realize they serve very different purposes. Understanding how Teams and…

Read More
26. 06. 2025 Gabriele Bocchi Automation, Development, DevOps

How to Secure GitHub Actions with SHA Pinning

GitHub Actions offer a powerful and flexible infrastructure for CI/CD, deployments and monitoring. But every external dependency we include opens a potential door for supply-chain attacks. One simple, effective, and low-cost way to seal that door is pinning your Actions to specific commit SHAs. In this article, we’ll explore the risks, walk through how to…

Read More
26. 06. 2025 Davide Sbetti Automation, Development, Documentation, NetEye

Building (and Customizing) Documentation for Your Ansible Collections

In NetEye, we use Ansible to automate many different tasks in an idempotent way, ranging from the first installation of the system to updates and upgrades. Ansible already comes with many built-in useful modules to manage files, perform HTTPS requests and much more. Furthermore, various Ansible Collections have been developed by the community to address…

Read More
25. 06. 2025 Simone Ragonesi DORA, Offensive Security, Red Team, TLPT

Why TLPT Is the Future of Financial Sector Cybersecurity

In the ever-evolving cyber threat landscape, financial institutions no longer have the luxury of relying on standard penetration tests or traditional assessments. As attackers grow more sophisticated and persistent, defenders must shift from theory to real-world simulation. This is exactly where Threat-Led Penetration Testing (TLPT) enters the picture, and with the EU’s Digital Operational Resilience…

Read More
25. 06. 2025 Mirko Ioris Blue Team, SEC4U

A Practical Guide to Working with Windows Authentication Logs – Part 1

If you’ve ever worked with Windows authentication logs, you know they can be a chaotic mess. Even when you’re looking for something apparently simple and useful – like tracking admin logins – you quickly find yourself in a sea of redundant entries, some of them logged for no apparent reason, and poorly documented details. I’ve…

Read More
24. 06. 2025 Marco Berlanda Development, Front-end, UI, UX, Vue

Reactivity Troubles: When Vue’s Magic Backfires

Let me start by saying: sure React is great, Angular is enterprise-ready, but my love falls on Vue. The reactivity system? Chef’s kiss. Watching values magically update the DOM like it’s reading your mind? Ammmazing. But sometimes, it feels less like magic and more like an unfair duel! You change a value, and five things…

Read More
23. 06. 2025 Alessandra Castiglioni Atlassian

Is Your Jira and Confluence World About to Change? Understanding the Shift from Connect to Forge

Are you a Jira or Confluence admin user? Do you rely on apps from the Atlassian Marketplace to supercharge your workflows and collaboration? If so, you might have heard whispers about some changes on the horizon. Don’t worry, we’re here to break it down for you in plain language and help you understand what it…

Read More
20. 06. 2025 Andrea Mariani NetEye, Unified Monitoring

NEP Telegram Notification

Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to enable NetEye’s notification system to send alerts directly to the Telegram app for many customers….

Read More
20. 06. 2025 Reinhold Trocker Unified Monitoring

Elastic Integration with Huge Memory Usage? Keep That Host Accessible!

In some environments, Elastic Agent integrations can unexpectedly consume excessive memory. This can be due to various reasons: misbehaving integrations, memory leaks, or simply under-provisioned hosts. When this happens, the Linux Kernel may invoke the OoM (Out of Memory) killer of systemd, terminating the Elastic Agent service and usually, disrupting data ingestion. How to Detect…

Read More
18. 06. 2025 Luca Zeni Blue Team, CTF Writeups

Hack The Box Business CTF 2025 – Nexus Breach Journey

Stepping Deeper into the CTF World It seems that this year, I’m a step further into the world of Capture The Flag (CTF) competitions: not sure why but I don’t regret it. We’re only halfway through the year, and I’ve already participated in three events. Not a huge amount, but a noticeable jump considering that…

Read More
18. 06. 2025 Francesco Belacca Microsoft

Dotnet Run App

Why am I writing this? The recent introduction of file‐based apps in .NET 10 Preview 4 marks a turning point in how we think about C# for quick tasks and prototyping. With a single command – dotnet run app.cs – you can now execute a standalone C# file without ever creating a .csproj (May 28,…

Read More
14. 06. 2025 Alessandro Valentini DevOps, NetEye

How to Add a Drive Selector to an ISO Image

Our old ISO used the first drive (sda) as the only option when installing the system. Sometimes we were asked to install NetEye on a different drive, so as a workaround we suggested properly sorting RAID arrays in the controller, in order to put the installation drive first on the list. Even if suboptimal, this…

Read More

Archive