techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#weblogic

0 posts0 participants0 posts today
Martin<p><a href="https://blog.martinscloud.com/oracle-use-docker-compose-for-oracle-weblogic-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.martinscloud.com/oracle-u</span><span class="invisible">se-docker-compose-for-oracle-weblogic-server/</span></a> <a href="https://dresden.network/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://dresden.network/tags/docker_compose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker_compose</span></a> <a href="https://dresden.network/tags/compose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compose</span></a> <a href="https://dresden.network/tags/docker_container" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker_container</span></a> <a href="https://dresden.network/tags/oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oracle</span></a> <a href="https://dresden.network/tags/weblogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>weblogic</span></a> <a href="https://dresden.network/tags/wls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wls</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> Server and <a href="https://infosec.exchange/tags/Mitel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitel</span></a> <a href="https://infosec.exchange/tags/MiCollab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MiCollab</span></a>&nbsp;flaws to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/172783/security/u-s-cisa-adds-oracle-weblogic-server-mitel-micollab-flaws-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/172783/sec</span><span class="invisible">urity/u-s-cisa-adds-oracle-weblogic-server-mitel-micollab-flaws-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Sebastian<p><a href="https://chilemasto.casa/tags/Tutorial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tutorial</span></a> para mantener ejecutando <a href="https://chilemasto.casa/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://chilemasto.casa/tags/Weblogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Weblogic</span></a> aunque se cierre la terminal de <a href="https://chilemasto.casa/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <br><a href="https://blogs.masterhacks.net/geek/tutoriales/como-mantener-ejecutandose-weblogic-en-linux-aunque-se-cierre-la-terminal/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.masterhacks.net/geek/tut</span><span class="invisible">oriales/como-mantener-ejecutandose-weblogic-en-linux-aunque-se-cierre-la-terminal/</span></a></p>
🅴🆁🆄🅰 🇷🇺В мире #<a class="" href="https://hub.hubzilla.de/search?tag=Java" rel="nofollow noopener" target="_blank">Java</a> есть отечественные легковестные контейнеризации для микросервисов:<br><blockquote>Базовый образ #<a class="" href="https://hub.hubzilla.de/search?tag=Axiom" rel="nofollow noopener" target="_blank">Axiom</a> #<a class="" href="https://hub.hubzilla.de/search?tag=Linux" rel="nofollow noopener" target="_blank">Linux</a> весит всего лишь 3.22 MB за счет оптимизации. При этом ни одна важная функциональность, необходимая для работы контейнеров, не вырезана. </blockquote> <span class="">#^</span><a class="" href="https://axiomjdk.ru/pages/axiom-linux/" rel="nofollow noopener" target="_blank">https://axiomjdk.ru/pages/axiom-linux/</a><br><blockquote>Axiom Linux полностью совместима с легковесной Axiom JDK PRO Lite, инструментарием для создания нативных образов Axiom NIK, входит в систему для создания миниатюрных Java-контейнеров Axiom Runtime Container Pro. </blockquote><br><br>От тех же людей, что и: <blockquote>#<a class="" href="https://hub.hubzilla.de/search?tag=Libercat" rel="nofollow noopener" target="_blank">Libercat</a> — это безопасный сервер приложений российского производства, реализующий спецификации Java EE / #<a class="" href="https://hub.hubzilla.de/search?tag=Jakarta" rel="nofollow noopener" target="_blank">Jakarta</a> EE, основанный на Apache #<a class="" href="https://hub.hubzilla.de/search?tag=Tomcat" rel="nofollow noopener" target="_blank">Tomcat</a> и Apache #<a class="" href="https://hub.hubzilla.de/search?tag=TomEE" rel="nofollow noopener" target="_blank">TomEE</a>.<br>Libercat является альтернативой Oracle #<a class="" href="https://hub.hubzilla.de/search?tag=WebLogic" rel="nofollow noopener" target="_blank">WebLogic</a>, IBM #<a class="" href="https://hub.hubzilla.de/search?tag=WebSphere" rel="nofollow noopener" target="_blank">WebSphere</a>, RedHat #<a class="" href="https://hub.hubzilla.de/search?tag=JBoss" rel="nofollow noopener" target="_blank">JBoss</a>, RedHat #<a class="" href="https://hub.hubzilla.de/search?tag=WildFly" rel="nofollow noopener" target="_blank">WildFly</a>, Apache Tomcat и другим подобным решениям. </blockquote><br><br>Как #<a class="" href="https://hub.hubzilla.de/search?tag=Java" rel="nofollow noopener" target="_blank">Java</a> была российской разработкой, так и никуда не делась с этими всеми рестрикциями-санкциями.<br>#<a class="" href="https://hub.hubzilla.de/search?tag=%D0%9C%D0%A6%D0%A1%D0%A2" rel="nofollow noopener" target="_blank">МЦСТ</a>, известное ныне Эльбрусами, в своё время как раз и делало Java, причём в Питере. И довольно хорошо сотрудничало с Intel, пока тот не захотел покупкой части МЦСТ угробить работу над Java и сотрудничество с Sun — именно после этого и люди из МЦСТ создали питерский филиал #<a class="" href="https://hub.hubzilla.de/search?tag=Sun" rel="nofollow noopener" target="_blank">Sun</a>, а потом #<a class="" href="https://hub.hubzilla.de/search?tag=Oracle" rel="nofollow noopener" target="_blank">Oracle</a> (располагались в убогом БЦ «Келлерман»).<br><br>#<a class="" href="https://hub.hubzilla.de/search?tag=linux" rel="nofollow noopener" target="_blank">linux</a> #<a class="" href="https://hub.hubzilla.de/search?tag=containerization" rel="nofollow noopener" target="_blank">containerization</a> #<a class="" href="https://hub.hubzilla.de/search?tag=softwaredevelopment" rel="nofollow noopener" target="_blank">softwaredevelopment</a> @<a href="https://3zi.ru/@Russia" rel="nofollow noopener" target="_blank">Russia</a>
securityaffairs<p>New <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> called <a href="https://infosec.exchange/tags/Hadooken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hadooken</span></a> targets <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> servers<br><a href="https://securityaffairs.com/168364/malware/hadooken-targets-oracle-weblogic-servers.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/168364/mal</span><span class="invisible">ware/hadooken-targets-oracle-weblogic-servers.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
Pyrzout :vm:<p>New ‘Hadooken’ Linux Malware Targets WebLogic Servers <a href="https://www.securityweek.com/new-hadooken-linux-malware-targets-weblogic-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/new-hadooken-</span><span class="invisible">linux-malware-targets-weblogic-servers/</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxmalware</span></a> <a href="https://social.skynetcloud.site/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Pyrzout :vm:<p>New ‘Hadooken’ Linux Malware Targets WebLogic Servers <a href="https://www.securityweek.com/new-hadooken-linux-malware-targets-weblogic-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/new-hadooken-</span><span class="invisible">linux-malware-targets-weblogic-servers/</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxmalware</span></a> <a href="https://social.skynetcloud.site/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Gray Hats#Oracle has issued a warning to users of its #WebLogic Server, urging them to immediately patch a critical flaw (CVE-2024-21181) that could lead to a complete takeover of the server. The flaw is easily exploitable and does not require any authentication https://t.co/J884QI1Dog
Alex Ivanovs<p>Oracle releases&nbsp;386 new security updates&nbsp;for the July patch round</p><p><a href="https://stackdiary.com/oracle-releases-386-new-security-updates-for-the-july-patch-round/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stackdiary.com/oracle-releases</span><span class="invisible">-386-new-security-updates-for-the-july-patch-round/</span></a></p><p><a href="https://mastodon.social/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://mastodon.social/tags/Patch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patch</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/Critical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Critical</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://mastodon.social/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mastodon.social/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://mastodon.social/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> <a href="https://mastodon.social/tags/MySQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MySQL</span></a> <a href="https://mastodon.social/tags/Siebel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Siebel</span></a> <a href="https://mastodon.social/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a> <a href="https://mastodon.social/tags/Database" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Database</span></a> <a href="https://mastodon.social/tags/Enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enterprise</span></a> <a href="https://mastodon.social/tags/Risk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Risk</span></a> <a href="https://mastodon.social/tags/Patching" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patching</span></a> <a href="https://mastodon.social/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a> <a href="https://mastodon.social/tags/Network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Network</span></a> <a href="https://mastodon.social/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://mastodon.social/tags/SecurityUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdate</span></a> <a href="https://mastodon.social/tags/SoftwareUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareUpdate</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/CriticalUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalUpdate</span></a> <a href="https://mastodon.social/tags/OraclePatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OraclePatch</span></a> <a href="https://mastodon.social/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreat</span></a> <a href="https://mastodon.social/tags/SecurityAlert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAlert</span></a></p>
ottoto<p>「積極的な <a href="https://prattohome.com/tags/%E6%94%BB%E6%92%83" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>攻撃</span></a> による <a href="https://prattohome.com/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://prattohome.com/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> Server OSの <a href="https://prattohome.com/tags/%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%82%A4%E3%83%B3%E3%82%B8%E3%82%A7%E3%82%AF%E3%82%B7%E3%83%A7%E3%83%B3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>コマンドインジェクション</span></a> の <a href="https://prattohome.com/tags/%E6%AC%A0%E9%99%A5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>欠陥</span></a> 」: The Hacker News</p><p>「米国サイバーセキュリティ・インフラストラクチャ・セキュリティ庁( <a href="https://prattohome.com/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> )は木曜日、 活発な悪用の証拠を引用して、Oracle WebLogic Serverに影響を与えるセキュリティ上の欠陥を既知の悪用された <a href="https://prattohome.com/tags/%E8%84%86%E5%BC%B1%E6%80%A7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>脆弱性</span></a> ( <a href="https://prattohome.com/tags/KEV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KEV</span></a> ) <a href="https://prattohome.com/tags/%E3%82%AB%E3%82%BF%E3%83%AD%E3%82%B0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>カタログ</span></a> に <a href="https://prattohome.com/tags/%E8%BF%BD%E5%8A%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>追加</span></a> しました。</p><p> <a href="https://prattohome.com/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2017-3506 (CVSS スコア: 7.4)として追跡される この問題は、オペレーティング システム (OS) コマンド インジェクションの脆弱性に関するもので、脆弱なサーバーへの不正アクセスを取得し、完全な制御を取得するために悪用される可能性があります。 」</p><p><a href="https://thehackernews.com/2024/06/oracle-weblogic-server-os-command.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2024/06/orac</span><span class="invisible">le-weblogic-server-os-command.html</span></a></p><p><a href="https://prattohome.com/tags/prattohome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prattohome</span></a> <a href="https://prattohome.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheHackerNews</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> Server flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/164094/hacking/cisa-adds-oracle-weblogic-server-flaw-to-its-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/164094/hac</span><span class="invisible">king/cisa-adds-oracle-weblogic-server-flaw-to-its-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Erik C. Thauvin<p>WebLogic: how it all began…</p><p><a href="https://mastodon.social/tags/java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>java</span></a> <a href="https://mastodon.social/tags/javaee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javaee</span></a> <a href="https://mastodon.social/tags/weblogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>weblogic</span></a></p><p><a href="https://www.qualogycaribbean.com/techblog/oracle/weblogic-how-it-all-began?utm_medium=erik.in&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">qualogycaribbean.com/techblog/</span><span class="invisible">oracle/weblogic-how-it-all-began?utm_medium=erik.in&amp;utm_source=mastodon</span></a></p>
ottoto<p>「8220 ギャングが <a href="https://prattohome.com/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://prattohome.com/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> Server の脆弱性を悪用してマルウェアを拡散 」: The Hacker News</p><p>「8220 ギャングには、既知のセキュリティ上の欠陥を利用して クリプトジャッキング マルウェアを配布してきた歴史があります 。 今年 5 月初め、このグループは Oracle WebLogic サーバーの別の欠点 (CVE-2017-3506、CVSS スコア: 7.4) を利用して、デバイスを仮想通貨マイニング ボットネットに結び付けていることが発見されました。」</p><p><a href="https://thehackernews.com/2023/12/8220-gang-exploiting-oracle-weblogic.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2023/12/8220</span><span class="invisible">-gang-exploiting-oracle-weblogic.html</span></a></p><p><a href="https://prattohome.com/tags/prattohome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prattohome</span></a> <a href="https://prattohome.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheHackerNews</span></a></p>
Helidon<p>Announcing <a href="https://mastodon.social/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> / <a href="https://mastodon.social/tags/Helidon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Helidon</span></a> Integration! </p><p>Learn about it in a blog article by Randy Stafford:<br><a href="https://blogs.oracle.com/weblogicserver/post/announcing-weblogic-helidon-integration" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.oracle.com/weblogicserve</span><span class="invisible">r/post/announcing-weblogic-helidon-integration</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> warns of <a href="https://hachyderm.io/tags/Mirai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mirai</span></a> <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> exploiting <a href="https://hachyderm.io/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> <a href="https://hachyderm.io/tags/routers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>routers</span></a><br>The US government's Cybersecurity and Infrastructure Security Agency (CISA) is adding three more flaws to its list of known-exploited <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a>, including one involving TP-Link routers that is being targeted by the operators of the notorious Mirai botnet.<br>The other two placed on the list this week involve versions of <a href="https://hachyderm.io/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a>'s <a href="https://hachyderm.io/tags/WebLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebLogic</span></a> Server software and the Apache Foundation's <a href="https://hachyderm.io/tags/Log4j" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Log4j</span></a> Java logging library<br><a href="https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2023/05/02/cis</span><span class="invisible">a_exploited_flaws_oracle_apache/</span></a></p>