software

v2.4.11 – Enhancements, Fixes, And Community Growth

Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.

This update introduces robust GraphQL support, multi-factor authentication, and innovative versioning for notes.

Explore the contributions from the community and key fixes that enhance functionality and security in this detailed release summary.

What’s Changed

  • Add GraphQL support on some endpoints
  • Add MFA support
  • Add Notes versioning
  • Automatically create data directories by @Matthijsy in #432
  • Graphql iocs by @c8y3 in #453
  • Graphql cases by @Elise17 in #461
  • Update case.notes.js to allow auto image upload from copy and paste by @LoneWolf-96 in #465
  • Add pool_pre_ping option by @smgrol in #468
  • Add graphql queries and mutations of cases by @Elise17 in #479
  • Graphql filters query ioc by @Elise17 in #483
  • Add custom X-IRIS-AUTH header by @Matthijsy in #506
  • GitHub workflows for image build and helm chart release by @tylerobara in #420
  • CICD to push to gchr in #511
  • CI/CD: GraphQL documentation spectaql by @Elise17 in #513

Fixed

  • Datastore files upload issue
  • Case status error
  • Fix Lookup of custom API Key header
  • Datastore files upload issue
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

5 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

1 week ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

1 week ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

1 week ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

1 week ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago