Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

The JNDI Strikes Back - Unauthenticated RCE in H2 Database Console

Very recently, the JFrog security research team has disclosed an issue in the H2 database console which was issued a critical CVE – CVE-2021-42392. This issue has the same root cause as the infamous Log4Shell vulnerability in Apache Log4j (JNDI remote class loading). H2 is a very popular open-source Java SQL database offering a lightweight in-memory solution that doesn’t require data to be stored on disk.
Sponsored Post

Speedscale Launches CLI: Free API Observability Tool

We are excited to announce the launch of Speedscale CLI, a free observability tool that inspects, detects and maps API calls on local applications or containers. The offering underscores the importance of continued and proactive API testing to quickly detect and debug defects within a shifting array of upstream and downstream interdependencies.

Sponsored Post

Build more resilient mobile apps with Flutter Crash Reporting

Powered by the Dart language, Flutter is one of the fastest-growing cross-platform programming frameworks in the world. Since its release in 2017 it has been empowering developers to build mobile apps that work seamlessly across iOS and Android with a single code-base. If you're a Flutter developer, you'll already know the importance of building better quality software, faster - after all, it was made for that very reason. That's why today, Raygun is proud to bring you Flutter support Crash Reporting. This highly requested release gives you complete visibility into the health of your Flutter applications, with rich diagnostics that take you to the root cause of errors and crashes.

IoT's Importance is Growing Rapidly, But Its Security Is Still Weak

The weakest link in most digital networks is the person sitting in front of the screen – the defining feature of the Internet of People (IoP). Because that’s where, through cunning and manipulative tactics, unsuspecting recipients can be tricked into opening toxic links. Little do they know, however, they’ve unwittingly opened the gates to digital catastrophe. Of course, I have nothing against people. In fact, some of my best friends are people!