On September 18, we hosted the NetEye Conference DACH 2025 at the Ofenwerk Nuremberg – a key event for NetEye users across the DACH region.
The RehubCom forum has emerged as a significant platform within the cybercrime underground, particularly as a successor to high-profile forums like XSS. It serves as a hub for the trade of stolen ...
The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears ...
Welcome to version 4.46 of our NetEye v4 Unified Monitoring Platform. As you log in, you’ll be greeted by the iconic bell tower of Curon rising from the frozen surface of Lake Resia (Reschensee). The ...
When monitoring Kubernetes clusters using Elastic Stack, the volume of logs can be overwhelming, often reaching gigabytes per minute. This is particularly true for OpenShift clusters, where ...
The Lookup Objects action allows you to query Assets using AQL (Asset Query Language) and store the resulting objects in a list. This data can then be referenced later in the automation using smart ...
One of the key points in the EriZone configuration is the connection to the database that contains information on the users of the system. A database without information on users has a negative effect ...
As a NetEye User I want to handle node failures when they happen in my cluster. When a node becomes unresponsive, it might still be accessing your data: the only way to ensure that a node is truly ...
Basically, the log source continuously sends log messages encrypted via TLS to the NetEye server. 1 TLS is handled by stunnel and then content is internally forwarded unencrypted to an Elastic Agent ...
In this blog post I’d like to show the remarkable improvement in one particular case using the ES|QL language. Suppose we want to detect the creation of a considerable number of files on a Windows ...
The year has just come to an end, and after a long stretch of work I could really use some rest. But before closing everything out completely, there’s one last thing I wan to share, and it needs a bit ...
This is the second part of my series about a challenge I developed for the WPCTF. In the first article (Infection Chain – Behind the Scenes), I talked about my experience participating in the WPCTF ...