article thumbnail

A Gentle Intro to eBPF

DZone

In this short article, we’ll explore eBPF (Extended Berkeley Packet Filter), an exciting new technology that makes programming the kernel flexible, safe, and accessible to developers. eBPF has been running in production for over half a decade at an internet scale on millions of servers.

Internet 195
article thumbnail

Log4j 2 Vulnerability: Identifying and Minimizing Production Risk

Dynatrace

This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then execute it. Public Internet Exposure. It results in remote code execution (RCE) by submitting a specially composed request.

Java 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is Cloud Computing? According to ChatGPT.

High Scalability

Cloud computing is a model of computing that delivers computing services over the internet, including storage, data processing, and networking. It allows users to access and use shared computing resources, such as servers, storage, and applications, on demand and without the need to manage the underlying infrastructure.

Cloud 201
article thumbnail

Application vulnerabilities: Important lessons from the OWASP top 10 about application security risks

Dynatrace

This method involves providing the lowest level of access by default, deleting inactive accounts, and auditing server activity. For this, best practices would be to segregate commands from data, use parameterized SQL queries, and eliminate the interpreter by using a safe application program interface, if possible.

article thumbnail

Log4Shell vulnerability: Identifying and minimizing production risk

Dynatrace

This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then execute it. Public Internet Exposure. It results in remote code execution (RCE) by submitting a specially composed request.

Java 185
article thumbnail

Improved PHP monitoring with even less overhead!

Dynatrace

Anything you want to do on a web server, you can do with PHP. This is why PHP is such a popular programming language for web development. Here are some statistics: PHP now accounts for about 79% of the server-side programming used on the Internet. Dynatrace news.

article thumbnail

PMM Authentication Bypass Vulnerability fixed in 2.37.1

Percona

We advise users to upgrade PMM at the earliest opportunity, particularly if the PMM instance is accessible directly from the Internet. If you believe you’ve identified a security issue, see the Percona Security page for reporting procedures, our security policies, and the Responsible Disclosure program.

C++ 88