software

v2.4.11 – Enhancements, Fixes, And Community Growth

Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.

This update introduces robust GraphQL support, multi-factor authentication, and innovative versioning for notes.

Explore the contributions from the community and key fixes that enhance functionality and security in this detailed release summary.

What’s Changed

  • Add GraphQL support on some endpoints
  • Add MFA support
  • Add Notes versioning
  • Automatically create data directories by @Matthijsy in #432
  • Graphql iocs by @c8y3 in #453
  • Graphql cases by @Elise17 in #461
  • Update case.notes.js to allow auto image upload from copy and paste by @LoneWolf-96 in #465
  • Add pool_pre_ping option by @smgrol in #468
  • Add graphql queries and mutations of cases by @Elise17 in #479
  • Graphql filters query ioc by @Elise17 in #483
  • Add custom X-IRIS-AUTH header by @Matthijsy in #506
  • GitHub workflows for image build and helm chart release by @tylerobara in #420
  • CICD to push to gchr in #511
  • CI/CD: GraphQL documentation spectaql by @Elise17 in #513

Fixed

  • Datastore files upload issue
  • Case status error
  • Fix Lookup of custom API Key header
  • Datastore files upload issue
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago