Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Real-time detection of BGP blackholing and prefix hijacks

Border Gateway Protocol (BGP) remains the backbone of inter-domain routing on the Internet, but its fundamental trust model leaves it vulnerable to misconfigurations, hijacks, and blackholing. When these issues occur, they often go undetected by the impacted networks—until users report degraded performance or service outages. This post walks through a real-world incident in which a legitimate traffic spike led to an upstream provider mistakenly blackholing a critical IP address.

Motadata AIOps | Monitoring Infrastructure Using Monitors & Monitor Settings

In the world of IT infrastructure management, having a real-time understanding of the health and performance of your systems is essential. Motadata AIOps introduces the Monitors, a way to provide comprehensive insights into your IT environment, empowering you to proactively manage and optimize your infrastructure.

Motadata AIOps - AI-Driven Network Monitoring Software

What positions Motadata AIOps as a standout among the premier network monitoring tools available in the market? In a crowded market of network monitoring tools, Motadata AIOps distinguishes itself through its intelligent and future-proof approach. The Network Observability tool leverages the power of AI to monitor your network and predict and prevent problems before they occur. This helps you achieve unmatched scalability for your growing network needs, while its open architecture and integration capabilities ensure a unified view of your entire IT environment.

Is There an Existential Crisis in Network Observability?

We've all been there. Users report that applications are slow, calls are dropping, or that "the internet is broken." Yet, a glance at the network dashboards shows a sea of green—latency looks acceptable, packet loss is minimal, and bandwidth seems fine. This common scenario highlights a fundamental challenge in network observability: the perceived disconnect between the technical measurements we gather and the actual experience of the people using our digital services.

Protecting Against SAP NetWeaver Vulnerability (CVE-2025-31324) with HAProxy

A critical vulnerability in SAP NetWeaver (CVE-2025-31324) is currently being exploited in the wild. Disclosed on April 24, 2025, this vulnerability has the highest possible CVSS score of 10.0, indicating severe risk. The vulnerability affects SAP NetWeaver Application Server Java's Visual Composer Framework (version 7.50), allowing unauthenticated attackers to upload arbitrary files to NetWeaver servers. This can lead to remote code execution and complete system compromise.

5 Critical Steps in the Effective Change Management Process. Guide + Best Practices

Change is constant, but without a structured approach, it can lead to confusion, resistance, and costly disruptions. A well-planned change management process ensures transitions happen smoothly, minimizing risks while keeping teams aligned and operations running efficiently. Whether adopting new technology, restructuring teams, or refining business strategies, organizations that manage change effectively turn challenges into opportunities for growth.

Application Performance Monitoring Guide: Strategies, Best Practices, and Tools

With the introduction of cloud services and microservices, applications have become more complicated due to their increased layers of complexity and distributed architecture. While microservices clearly offer speed, they also make things harder for the developers and operations teams. These teams need to plan for the reliable and efficient performance of such applications. To combat these challenges, application performance monitoring (APM) has surfaced as an indispensable discipline.

Turning Network Telemetry into Network Intelligence

By applying data engineering and machine learning to raw network telemetry, it’s possible to surface insights that would otherwise go unnoticed. Learn how this approach helps teams detect anomalies in real time, forecast capacity needs, and automate responses across complex, multi-domain environments.