Blog Entries

31. 07. 2024 Gianluca Piccolo ctf-writeups

CTF Exploit: Not A Democratic Election

Hello everyone, today I’d like to show you how we exploited the Not a democratic election challenge from HTB Business CTF 2024. This challenge is of type Blockchain and is based on Solidity Smart Contracts for Ethereum. Since the official exploit uses Foundry, and I couldn’t run Foundry on my workstation, I’d like to report…

Read More
31. 07. 2024 Mirko Ioris SEC4U, SOCnews

July 19 – The Day Cyber Security Almost Caused a Global IT Blackout

On Friday morning, July 19th, a major computer outage caused problems in Microsoft computers all over the world. There were delays and flight cancellations at several airports, and malfunctions in the computer systems of banks, shops, hospitals and the media. The IT blackout was caused by a faulty update released for Falcon Sensor, the EDR…

Read More
30. 07. 2024 Lorenzo Candeago DevOps

Terraform Integration with Ansible

In this blog post we’ll try a tool that’s new to me, called Terraform, and see how easy it is to integrate it with Ansible starting with no knowledge of Terraform. Terraform is a tool that allows you to automate resource provisioning; it uses HCL2 as the configuration language, and support has recently been added,…

Read More
29. 07. 2024 Lorenzo Candeago DevOps

include_task vs import_task in Ansible

After updating one of our machines, we found that some of our Ansible playbooks were failing with the following error: The include module was removed in ansible 2.16, while the include warning deprecation was already present in ansible 2.12. At this point, we can choose between two possible modules to replace include: import_tasks or include_tasks….

Read More
26. 07. 2024 Alessandro Valentini DevOps

Bonding Configuration While Adding an OpenShift Node

When you prepare a machine for production, you usually want to use a redundant network interface in order to be resilient to possible network outages. When we created our OpenShift cluster this wasn’t possible during the installation procedure, at least not using the UPI procedure. We recently added a new node and discovered this new…

Read More
25. 07. 2024 Alessandro Romboli Asset Management, NetEye

GLPI Device Discovery

Scenario GLPI is integrated into NetEye and provides powerful asset management solutions. Usually GLPI agents are deployed on servers and clients: this way an up-to-date asset inventory is kept within NetEye. The GLPI package also provides a tool able to perform network SNMP scans, detecting for example network printers, switches, and routers, as well as…

Read More
25. 07. 2024 Alessandra Castiglioni Atlassian, Development

Elevate Your Atlassian Experience: Claim Your Domain Today!

Why Claiming Your Domain in Atlassian is a Game-Changer In today’s interconnected business world, security and efficiency are paramount. Atlassian, with its suite of powerful collaboration and project management tools, offers a robust platform to streamline workflows. To truly maximize the potential of Atlassian, claiming your domain and centralizing user management is a critical step….

Read More
24. 07. 2024 Lorenzo Candeago DevOps

How to Add SSH Keys to ArgoCD and Tekton on OpenShift to Access Gitea: Part 3 – A Simple Tekton TaskRun

In the first blog post of this series I showed you how to set up an OpenShift test environment and set up Gitea via helm chart and add an ssh key to Gitea. In the second blog post we created a deployment with ArgoCD that clones via ssh from our Gitea instance. In this final…

Read More
23. 07. 2024 Elena Valgoi Atlassian, Knowledge Management, Service Management

Microsoft 365 for Jira – Outlook Email, Teams, Calendar

Discover how you can benefit from Microsoft 365 integration! Hello everyone! We’re happy to announce that the integration with Microsoft 365 and Jira is now available ❤ Read this article, to know how you can benefit from it 😉 🎉 🎇 Features in Jira Here’s the list of the most important features that you will…

Read More
18. 07. 2024 Damiano Chini Bug Fixes, NetEye

Bug Fixes for NetEye 4.36

We fixed a bug that caused the neteye install command to not wait for resources to restart after the procedure completed. We updated the following packages:

Read More
17. 07. 2024 Lorenzo Candeago DevOps

How to Add SSH Keys to ArgoCD and Tekton on OpenShift to Access Gitea: Part2 – Add an SSH Key as a Secret to ArgoCD and Run a Test Deployment

In my previous post, we set up our test environment and a Gitea operator. In this blog post we’ll install the OpenShift GitOps operator and run a simple deployment. This setup allows us to test OpenShift-specific security constraints (such as OpenShift-specific SCCs, non privileged containers by default, etc.) in a test environment before going into…

Read More
17. 07. 2024 Lorenzo Candeago DevOps

How to Add SSH Keys to ArgoCD and Tekton on OpenShift to Access Gitea: Part1 – Set up the Test Environment and Add SSH Key to Gitea

In this series of blog posts I’ll show you how to set up ArgoCD and Tekton to clone git repositories via ssh from a Gitea instance hosted on an OpenShift cluster. Please note that for the sake of this blog post, the configurations are not suited for use in production, but just to give you…

Read More
16. 07. 2024 Beatrice Dall'Omo Blue Team, Red Team, SEC4U

Automate Business Processes with APIs: python-gvm

Have you already read this blog post Adding soar features to the soc part 1 vulnerability management? If not, you have to! It explains the SOAR features leveraged by the Würth Phoenix SOC and how we implement our Vulnerability Management process.  In this article, I’ll take a step back, focusing on what happens before the…

Read More
09. 07. 2024 Gianluca Piccolo Bug Fixes, NetEye

Bug Fixes for NetEye 4.36

We released an update for GLPI that fixes several vulnerabilities. We updated the following packages:

Read More
08. 07. 2024 Tobias Goller Unified Monitoring

Collecting Netflows – ntopng vs. ElastiFlow

In order to be able to carry out detailed network monitoring, an IT administrator naturally wants to know what is happening in his or her network. To obtain this information, the network flows must of course be analyzed. Many network devices offer the option of creating netflows, which are sent to a recipient who can…

Read More

Archive