The RehubCom forum has emerged as a significant platform within the cybercrime underground, particularly as a successor to ...
On September 18, we hosted the NetEye Conference DACH 2025 at the Ofenwerk Nuremberg – a key event for NetEye users across the DACH region.
Welcome to version 4.46 of our NetEye v4 Unified Monitoring Platform. As you log in, you’ll be greeted by the iconic bell tower of Curon rising from the frozen surface of Lake Resia (Reschensee). The ...
During my experience as a Würth Phoenix consultant, I’ve seen a pretty long list of broken Icinga 2 configurations. Several times, customers have begun a scheduled meeting with something like “Hey ...
Customer experience is a crucial factor for the success of any IT support team. Often, agents manage tickets without a clear understanding of the customer’s emotional state, making it difficult to ...
Grafana has become one of the most used modules of NetEye. As many of you know, it’s very easy to export and import individual Grafana dashboards using the existing export functionality via JSON. [1] ...
Using our CTI SATAYO platform, we identified an artifact belonging to AMMEGA’s data breach. AMMEGA is a multinational manufacturing company based in the Netherlands with revenues of $1.2 billion. It ...
CVE-2025-54988 (Apache Tika): CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MPR:L For a detailed overview of the security issue(s), including the impact, CVSS score ...
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, ...
The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears ...
When monitoring Kubernetes clusters using Elastic Stack, the volume of logs can be overwhelming, often reaching gigabytes per minute. This is particularly true for OpenShift clusters, where ...
One of the key points in the EriZone configuration is the connection to the database that contains information on the users of the system. A database without information on users has a negative effect ...