software

v2.4.11 – Enhancements, Fixes, And Community Growth

Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.

This update introduces robust GraphQL support, multi-factor authentication, and innovative versioning for notes.

Explore the contributions from the community and key fixes that enhance functionality and security in this detailed release summary.

What’s Changed

  • Add GraphQL support on some endpoints
  • Add MFA support
  • Add Notes versioning
  • Automatically create data directories by @Matthijsy in #432
  • Graphql iocs by @c8y3 in #453
  • Graphql cases by @Elise17 in #461
  • Update case.notes.js to allow auto image upload from copy and paste by @LoneWolf-96 in #465
  • Add pool_pre_ping option by @smgrol in #468
  • Add graphql queries and mutations of cases by @Elise17 in #479
  • Graphql filters query ioc by @Elise17 in #483
  • Add custom X-IRIS-AUTH header by @Matthijsy in #506
  • GitHub workflows for image build and helm chart release by @tylerobara in #420
  • CICD to push to gchr in #511
  • CI/CD: GraphQL documentation spectaql by @Elise17 in #513

Fixed

  • Datastore files upload issue
  • Case status error
  • Fix Lookup of custom API Key header
  • Datastore files upload issue
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

5 hours ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

1 day ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

2 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

2 days ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

2 days ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

3 days ago