Minor update that is tested with Java 21 and 25, for which it removed the unused ThriftyList class. It also upgraded dependencies to Log4j 2.25.2 and Commons Lang3 3.19
Euclid is a library of numeric […]
Minor update that is tested with Java 21 and 25, for which it removed the unused ThriftyList class. It also upgraded dependencies to Log4j 2.25.2 and Commons Lang3 3.19
Euclid is a library of numeric […]
podcasts.apple.com/de/podcast/f...
#java #log4j #log4shell
podcasts.apple.com/de/podcast/f...
#java #log4j #log4shell
One small library affecting billions of systems.
Log4Shell was the biggest security vulnerability of all time.
Now, Log4J maintainer, Christian Grobmeier tells us what it felt like inside the flames 👉 github.blog/open-source/...
One small library affecting billions of systems.
Log4Shell was the biggest security vulnerability of all time.
Now, Log4J maintainer, Christian Grobmeier tells us what it felt like inside the flames 👉 github.blog/open-source/...
Has xkcd done a thing on dns yet? (They did a log4j one I recall)
Has xkcd done a thing on dns yet? (They did a log4j one I recall)
https://kripta.biz/posts/DDCABDEE-527C-4BD8-9AC6-5063D81BD44E
https://kripta.biz/posts/DDCABDEE-527C-4BD8-9AC6-5063D81BD44E
every new language, has the same old bugs.
GoLang: http://[;whoami].example.com
Java/Log4J: ${java:version}
Shellshock ...
Parsing is hard
every new language, has the same old bugs.
GoLang: http://[;whoami].example.com
Java/Log4J: ${java:version}
Shellshock ...
Parsing is hard
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. en…
#hackernews #news
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. en…
#hackernews #news
#Log4j #IIS #chinahackers #chinesehackers #legacybugs #globalespionagetools #cyberattack
#Log4j #IIS #chinahackers #chinesehackers #legacybugs #globalespionagetools #cyberattack
https://medium.com/asecuritysite-when-bob-met-alice/log4j-the-worst-vulnerability-in-nearly-a-decade-e0cc80cbb49a
https://medium.com/asecuritysite-when-bob-met-alice/log4j-the-worst-vulnerability-in-nearly-a-decade-e0cc80cbb49a
https://medium.com/quine/the-1st-commit-of-git-git-no-longer-belongs-to-linus-torvalds-ea1df6f8f025
https://medium.com/quine/the-1st-commit-of-git-git-no-longer-belongs-to-linus-torvalds-ea1df6f8f025
https://digiconasia.net/infographic/state-of-java-in-s-e-asia
#DevOps #and #AppDev #Infographics #AI #development #Azul #Log4j #vulnerabilities #State #of
Event Attributes
https://digiconasia.net/infographic/state-of-java-in-s-e-asia
#DevOps #and #AppDev #Infographics #AI #development #Azul #Log4j #vulnerabilities #State #of
Event Attributes
Abstract: Log4j has become a widely adopted logging library for Java programs due to its long history and high reliability. Its widespread use is notable not only because of its maturity but also due to the [1/7 of https://arxiv.org/abs/2504.03167v1]
Abstract: Log4j has become a widely adopted logging library for Java programs due to its long history and high reliability. Its widespread use is notable not only because of its maturity but also due to the [1/7 of https://arxiv.org/abs/2504.03167v1]