mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

9K
active users

#apachetomcat

0 posts0 participants0 posts today
Graylog<p>⚠️ CVE-2025-24813 is a critical vulnerability (CVSS base score of 9.8) affecting Apache Tomcat — a widely used open-source web server and servlet container. Learn how to detect exploits/attacks that target this vulnerability, using <a href="https://infosec.exchange/tags/Graylog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Graylog</span></a>.💡 </p><p>Read on to see:<br>😈 How to emulate the adversary<br>🏃‍♂️ How to run the exploit<br>📋 Steps for a real attack<br>📄 A summary of local exploit steps<br>🔎 Detections &amp; indicators<br>And more.</p><p><a href="https://graylog.org/post/exploit-rce-in-apache-tomcat/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">graylog.org/post/exploit-rce-i</span><span class="invisible">n-apache-tomcat/</span></a> <a href="https://infosec.exchange/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/GraylogLabs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GraylogLabs</span></a> <a href="https://infosec.exchange/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://infosec.exchange/tags/CVE202524813" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202524813</span></a></p>
flagthis<p>Urgent: CISA adds Apache Tomcat vulnerability (CVE-2025-24813) to KEV catalog; update now! <a href="https://ioc.exchange/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://ioc.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://ioc.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> <br> <br>More details: <a href="https://securityaffairs.com/176129/security/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/sec</span><span class="invisible">urity/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a> - <a href="https://www.flagthis.com/news/12398" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">flagthis.com/news/12398</span><span class="invisible"></span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a>: Angriffe auf kritische Sicherheitslücke laufen | Security <a href="https://www.heise.de/news/Apache-Tomcat-Angriffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Apache-Tomcat-An</span><span class="invisible">griffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html</span></a> <a href="https://social.tchncs.de/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://social.tchncs.de/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> :apache:</p>
GreyNoise<p>🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Exploits limited to naive attackers using PoC code. Full analysis &amp; attacker IPs: <a href="https://greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">greynoise.io/blog/active-explo</span><span class="invisible">itation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813</span></a><br><a href="https://infosec.exchange/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE202524813" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202524813</span></a></p>
Pyrzout :vm:<p>Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? – Source: www.techrepublic.com <a href="https://ciso2ciso.com/stealthy-apache-tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk-source-www-techrepublic-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/stealthy-apache-</span><span class="invisible">tomcat-critical-exploit-bypasses-security-filters-are-you-at-risk-source-www-techrepublic-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/SecurityonTechRepublic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityonTechRepublic</span></a> <a href="https://social.skynetcloud.site/tags/SecurityTechRepublic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityTechRepublic</span></a> <a href="https://social.skynetcloud.site/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://social.skynetcloud.site/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://social.skynetcloud.site/tags/webservers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webservers</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/servlets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>servlets</span></a> <a href="https://social.skynetcloud.site/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a></p>
Pyrzout :vm:<p>Threat actors rapidly exploit new Apache Tomcat flaw following PoC release – Source: securityaffairs.com <a href="https://ciso2ciso.com/threat-actors-rapidly-exploit-new-apache-tomcat-flaw-following-poc-release-source-securityaffairs-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/threat-actors-ra</span><span class="invisible">pidly-exploit-new-apache-tomcat-flaw-following-poc-release-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
nemo™ 🇺🇦<p>🚨 Critical Apache Tomcat flaw! 🚨 Hackers can easily take over servers due to a deserialization vulnerability (CVE-2025-24813). Exploit requires no authentication &amp; bypasses many WAFs. Update to versions 11.0.3, 10.1.35 or 9.0.98 ASAP! More info: <a href="https://www.techradar.com/pro/security/a-worrying-critical-security-flaw-in-apache-tomcat-could-let-hackers-take-over-servers-with-ease" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/a-w</span><span class="invisible">orrying-critical-security-flaw-in-apache-tomcat-could-let-hackers-take-over-servers-with-ease</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a></p>
Trevor McLeod<p>If you use <a href="https://mastodon.social/tags/tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tomcat</span></a> you might want to read this:</p><p><a href="https://mastodon.social/tags/webserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webserver</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/j2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>j2ee</span></a><br><a href="https://mastodon.social/tags/apachetomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apachetomcat</span></a> </p><p><a href="https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/</span></a></p>
Pyrzout :vm:<p>Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum – Source: www.securityweek.com <a href="https://ciso2ciso.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/exploit-code-for</span><span class="invisible">-apache-tomcat-rce-vulnerability-published-on-chinese-forum-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>-2025-24813 <a href="https://social.skynetcloud.site/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. <a href="https://kolektiva.social/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://kolektiva.social/tags/CyberAlerts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAlerts</span></a> <a href="https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/</span></a></p>
LavX News<p>Critical RCE Vulnerability in Apache Tomcat Poses Severe Threat to Server Security</p><p>A newly disclosed remote code execution vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is being actively exploited by attackers, allowing them to take full control of affected servers with...</p><p><a href="https://news.lavx.hu/article/critical-rce-vulnerability-in-apache-tomcat-poses-severe-threat-to-server-security" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/critical-</span><span class="invisible">rce-vulnerability-in-apache-tomcat-poses-severe-threat-to-server-security</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.cloud/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a></p>
Pyrzout :vm:<p>New Apache Tomcat Vulnerabilities Let Attackers Execute Remote Code <a href="https://cybersecuritynews.com/apache-tomcat-rce-vulnerability/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/apache-t</span><span class="invisible">omcat-rce-vulnerability/</span></a> <a href="https://social.skynetcloud.site/tags/ComputerVulnerabilityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerVulnerabilityNews</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityThreatsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityThreatsToday</span></a> <a href="https://social.skynetcloud.site/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/VulnerabilityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a></p>
🅴🆁🆄🅰 🇷🇺Компания «Axiom JDK» выкатило бесплатно #<a class="" href="https://hub.hubzilla.de/search?tag=Java" rel="nofollow noopener noreferrer" target="_blank">Java</a> для некоммерческого использования и началось очередное брожение говн в пустых головах. Например, тут <a href="https://habr.com/ru/companies/axiomjdk/news/854356/" rel="nofollow noopener noreferrer" target="_blank">в комментах на хабре</a> понабежала стая хомячков, ничего не соображающих в раскладах, но очень желающих проявить свой лоскутное мышление, за счёт втыкания везде где ни попади те или иные лозунги с кричалками.<br><br>«Axiom JDK» изначально именовалась как «Bellsoft»/«БеллСофт» и основана в 2017 году выходцами из «Центра Разработок Oracle в Санкт-Петербурге» — того самого, который ранее создали люди типа Анны Барски. Создавали в следствии того, что Intel решила купить часть «МЦСТ» и надо было из неё вывести те команды, что работали над #<a class="" href="https://hub.hubzilla.de/search?tag=Java" rel="nofollow noopener noreferrer" target="_blank">Java</a> для компании #<a class="" href="https://hub.hubzilla.de/search?tag=SunMicrosystems" rel="nofollow noopener noreferrer" target="_blank">SunMicrosystems</a>. Потом произошло поглощение компании Sun никому неизвестной #<a class="" href="https://hub.hubzilla.de/search?tag=Oracle" rel="nofollow noopener noreferrer" target="_blank">Oracle</a> и это всё стало именоваться «Центра Разработок Oracle».<br><br>Из него ушла часть людей, как и сама Анна Барски, в компанию «Azul Systems» — предоставляющую единственный в мире Java-сервер приложений не страдающий «замираниями мира» (фризами). Это важно и мощно потому, что для Java сделано аж четыре разных Garbage Collector (GC), в разработку каждого вложено как бюджет средней европейской страны. И не один из них не решает вопрос паузы исполнения кода, удалось эту беду побороть лишь в сервере приложения от компании «Azul Systems».<br><br>И вот все те, кто не ушли в своё время во вновь создававшийся в Питере филиал #<a class="" href="https://hub.hubzilla.de/search?tag=AzulSystems" rel="nofollow noopener noreferrer" target="_blank">AzulSystems</a> или же потом пострадали от ухода компании из РФ — это и есть «Axiom JDK».<br><br>На #<a class="" href="https://hub.hubzilla.de/search?tag=youtube" rel="nofollow noopener noreferrer" target="_blank">youtube</a> можно найти выступление <a href="https://www.youtube.com/watch?v=WG9JOL8Imns" rel="nofollow noopener noreferrer" target="_blank">Анны Барски «Java Life Story»</a> о том, с чего и как вся разработка Java пошла и развивалась вокруг команд в РФ с кем в #<a class="" href="https://hub.hubzilla.de/search?tag=Sun" rel="nofollow noopener noreferrer" target="_blank">Sun</a> работали — оно аж 11-летней давности.<br><br>А всякую сводную информацию по&nbsp;&nbsp;«БеллСофт» можно найти <a href="https://www.tadviser.ru/index.php/Компания:Axiom_JDK_(БеллСофт)_ранее_Bellsoft" rel="nofollow noopener noreferrer" target="_blank">на тадвайзере</a>. Такого плана как то, что с 2019-года активно участвует в развитии Java-платформы:<br><blockquote>«...на декабрь 2019 года входит в топ-5 контрибьюторов #<a class="" href="https://hub.hubzilla.de/search?tag=OpenJDK" rel="nofollow noopener noreferrer" target="_blank">OpenJDK</a> вместе с Oracle, Red Hat, SAP и Google.<br>Компания выпускает и поддерживает #<a class="" href="https://hub.hubzilla.de/search?tag=Liberica" rel="nofollow noopener noreferrer" target="_blank">Liberica</a> JDK — Java-дистрибутив на основе #<a class="" href="https://hub.hubzilla.de/search?tag=OpenJDK" rel="nofollow noopener noreferrer" target="_blank">OpenJDK</a> для расширенного набора платформ, включая контейнеризованные сборки c #<a class="" href="https://hub.hubzilla.de/search?tag=AlpineLinux" rel="nofollow noopener noreferrer" target="_blank">AlpineLinux</a>. «БеллСофт» имеет лицензию TCK, поэтому Liberica JDK гарантированно соответствует стандарту #<a class="" href="https://hub.hubzilla.de/search?tag=JavaSE" rel="nofollow noopener noreferrer" target="_blank">JavaSE</a>.<br>В то же время, компания разрабатывает #<a class="" href="https://hub.hubzilla.de/search?tag=LiberCat" rel="nofollow noopener noreferrer" target="_blank">LiberCat</a> - российский сервер приложений #<a class="" href="https://hub.hubzilla.de/search?tag=JavaEE" rel="nofollow noopener noreferrer" target="_blank">JavaEE</a> на основе проекта с открытым исходным кодом #<a class="" href="https://hub.hubzilla.de/search?tag=ApacheTomcat" rel="nofollow noopener noreferrer" target="_blank">ApacheTomcat</a>.<br>Деятельность компании также связана с развитием и поддержкой других сложных продуктов с открытым кодом, таких как OpenJDK, компиляторов #<a class="" href="https://hub.hubzilla.de/search?tag=gcc" rel="nofollow noopener noreferrer" target="_blank">gcc</a> и #<a class="" href="https://hub.hubzilla.de/search?tag=LLVM" rel="nofollow noopener noreferrer" target="_blank">LLVM</a> и платформы работы с большими данными #<a class="" href="https://hub.hubzilla.de/search?tag=Hadoop" rel="nofollow noopener noreferrer" target="_blank">Hadoop</a> ...»</blockquote><br>И на текущий момент на базе решений «Axiom JDK» работают ИТ-сервисы обслуживающие в РФ порядка 100 (ста) миллионов граждан/жителей/населения.<br><br>#<a class="" href="https://hub.hubzilla.de/search?tag=software" rel="nofollow noopener noreferrer" target="_blank">software</a> #<a class="" href="https://hub.hubzilla.de/search?tag=softwaredevelopment" rel="nofollow noopener noreferrer" target="_blank">softwaredevelopment</a> #<a class="" href="https://hub.hubzilla.de/search?tag=%D0%9C%D0%A6%D0%A1%D0%A2" rel="nofollow noopener noreferrer" target="_blank">МЦСТ</a> #<a class="" href="https://hub.hubzilla.de/search?tag=AxiomJDK" rel="nofollow noopener noreferrer" target="_blank">AxiomJDK</a> #<a class="" href="https://hub.hubzilla.de/search?tag=java" rel="nofollow noopener noreferrer" target="_blank">java</a> #<a class="" href="https://hub.hubzilla.de/search?tag=lang_ru" rel="nofollow noopener noreferrer" target="_blank">lang_ru</a> @<a href="https://3zi.ru/@Russia" rel="nofollow noopener noreferrer" target="_blank">Russia</a>
InfoQ<p><a href="https://techhub.social/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> 11 is here!</p><p>Apache Tomcat 11 brings several notable advancements; one of the most significant is the support for <a href="https://techhub.social/tags/VirtualThreads" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VirtualThreads</span></a>, introduced as part of Java's Project Loom and delivered in JDK 21.</p><p>Learn more: <a href="https://bit.ly/4hzCB4j" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4hzCB4j</span><span class="invisible"></span></a> </p><p><a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoQ</span></a> <a href="https://techhub.social/tags/Java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Java</span></a></p>
Pyrzout :vm:<p>Kinsing Malware Attacking Apache Tomcat Servers To Deploy Cryptominers <a href="https://gbhackers.com/kinsing-malware-apache-tomcat-servers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/kinsing-malware-</span><span class="invisible">apache-tomcat-servers/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> <a href="https://social.skynetcloud.site/tags/KinsingMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KinsingMalware</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linuxmalware</span></a> <a href="https://social.skynetcloud.site/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://social.skynetcloud.site/tags/cryptomining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptomining</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
Elizabeth K. Joseph<p>The s390x open source team at IBM works to get the latest versions of open source software running for <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> on <a href="https://floss.social/tags/IBMZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IBMZ</span></a> and in June 2023 currency was maintained for 2 dozen projects, including <a href="https://floss.social/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a>, <a href="https://floss.social/tags/Gluster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gluster</span></a> &amp; <a href="https://floss.social/tags/InfluxDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfluxDB</span></a> ! ✨<br> <br>Full report at <a href="https://community.ibm.com/community/user/ibmz-and-linuxone/blogs/elizabeth-k-joseph1/2023/07/12/linuxone-open-source-report-june-2023" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">community.ibm.com/community/us</span><span class="invisible">er/ibmz-and-linuxone/blogs/elizabeth-k-joseph1/2023/07/12/linuxone-open-source-report-june-2023</span></a> <a href="https://floss.social/tags/LinuxONE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxONE</span></a></p>
davidochobits<p>Instalar Apache Tomcat 10 en Rocky Linux 8</p><p><a href="https://www.ochobitshacenunbyte.com/2023/05/08/instalar-apache-tomcat-10-en-rocky-linux-8/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ochobitshacenunbyte.com/2023/0</span><span class="invisible">5/08/instalar-apache-tomcat-10-en-rocky-linux-8/</span></a></p><p><a href="https://mastodon.bitsandlinux.com/tags/Tomcat10" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat10</span></a> <a href="https://mastodon.bitsandlinux.com/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://mastodon.bitsandlinux.com/tags/Java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Java</span></a> <a href="https://mastodon.bitsandlinux.com/tags/RockyLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RockyLinux</span></a></p>