News

All detection examples are mapped to techniques from the MITRE ATT&CK framework: ...
Cron Job Monitoring with Tornado (Part 2) In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let’s continue with the creation of a ...
At the heart of ITIL® 4 lies a profound philosophical shift: instead of focusing solely on control, stability, and ...
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
If you’ve ever tried integrating an external system or website with Jira Service Management (JSM), you’ve probably hit one or more roadblocks, especially when it comes to creating requests on behalf ...
The Tools of the Trade To achieve my goal, I used: Tekton Pipelines to define the CI/CD workflow as code. PipelineRun to execute the pipeline with specific parameters. Custom Tekton Task to run oc CLI ...
Welcome to version 4.42 of our NetEye v4 Unified Monitoring Platform. Summer has arrived on the Seiser Alm, and with it, clear views of two of South Tyrol’s most iconic peaks: Langkofel (Sassolungo) ...
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, ...
Customer experience is a crucial factor for the success of any IT support team. Often, agents manage tickets without a clear understanding of the customer's emotional state, making it difficult to ...
CVSS: 6.3 (medium): CVSS3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N For a detailed overview of the security issue(s), including the impact, CVSS score, acknowledgments ...
Welcome to version 4.40 of our NetEye v4 Unified Monitoring Platform. For this release, we’re taking you on a calming walk around Lake Dobbiaco, through a calm snowy winter landscape. The area is ...
WARNING: This post is constantly updated based on new evidence related to the data breach. The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post ...