The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears ...
The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears ...
As the digital arena evolves at lightning speed, so do the tactics of those seeking to breach it. Traditional security measures are no longer enough for today’s increasingly sophisticated cyber ...
Nowadays attacks evolve over time and threat actors are following different ways to reach the same objectives. This could represent a problem on the defensive side. How could you always be up-to-date ...
When monitoring Kubernetes clusters using Elastic Stack, the volume of logs can be overwhelming, often reaching gigabytes per minute. This is particularly true for OpenShift clusters, where ...
Full Stack Developer at Wuerth Phoenix. I love questioning myself, find new challenges to learn and new adventures to grow up. PHP lover trying to expand my skills studying new languages and tools to ...
As already mentioned in my other blog posts, NetEye 4 is based on Icinga Web 2, a powerful PHP framework. During the development of some of our custom NetEye modules for Icinga Web 2, we needed to ...
Have you ever had the need to manage in your inventory the location and the content of your racks? The plugin Bays Management for GLPI can also be adopted to meet this need. With the plugin it is ...