In a previous blog post by one of my colleagues, we shared how we developed a powerful semantic search engine for our NetEye User Guide. This solution uses Elasticsearch in combination with machine ...
During engagements, it may happen that a Linux machine is compromised with only a brief and limited window of access. In such ...
On the 36th Chaos Communication Congresses back before Covid forced a three year break, I attended a talk from the German tech-blogger Fefe. There he talked about the “nützlich-unbedenklich Spektrum” ...
As the digital arena evolves at lightning speed, so do the tactics of those seeking to breach it. Traditional security measures are no longer enough for today’s increasingly sophisticated cyber ...
The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears ...
Writing high-performance code is key when tackling complex problems. While it might be tempting to focus on optimizing the programming language itself, the best strategy is often to implement the ...
The 2024 edition of the WP CTF has ended, and we are thrilled to announce its resounding success! This year, approximately 80 participants formed teams from across Europe, including Greece, Germany, ...
We fixed a procmail misconfiguration that was occurring after the upgrade.
In this blog post I’d like to show the remarkable improvement in one particular case using the ES|QL language. Suppose we want to detect the creation of a considerable number of files on a Windows ...
At the beginning of the month we released NetEye version 4.37 that contains Elastic Stack 8.14.3. Every version update of Elastic has both improvements and additions. To see all available integrations ...
In this article, we’ll explore how to configure the “Agent Binary Download” setting and set up your own artifact registry for binary downloads within a NetEye cluster.