Supply Chain Attack Methodologies – It’s the Installer Now

”Supply chain attack” encompasses many different forms of attacks and exploits Yet another type was recently uncovered – malicious behavior in properly signed installers While this particular case was not Java specific, ...

From Log4j to Long4j

| | Java, java updates, Log4j, security
Veracode reports that more than a third of Java application still use vulnerable versions of Log4j despite efforts to eradicate it. The post From Log4j to Long4j appeared first on Azul | ...
software developer memory safe languages

CISA to Developers: Adopt Memory Safe Programming Languages

| | cisa, Go, Java, memory safe language, rust
Software makers need to embrace the growing number of newer programming languages that protect memory to reduce the number of security vulnerabilities in their products, according to cybersecurity agencies in the United ...
Security Boulevard
A number ‘10’ printed on a roughly rendered wall

Atlassian Bug now a Perfect 10: Riot of Ransomware Raids

Step #1: Get it off the Internet—Confluence Data Center and Server on-prem products perfectly pwned, so patch ...
Security Boulevard

Supply Chain Attacks – Risk Perception vs Reality

Supply chain attacks have surged in recent years, gradually becoming a formidable threat in the cybersecurity landscape. Yet, despite their growing prevalence, there seems to be a disconnection between the perception and ...
IMAGE: Azul State of Java Survey and Report 2023

Java Is Still Full of Surprises After 28 Years

State of Java 2023 is an authoritative guide to understanding Java adoption and trends, Oracle’s recent pricing update. The post Java Is Still Full of Surprises After 28 Years appeared first on ...

The Dangerous Numbers Behind Supply Chain Attacks

Supply chain attacks have witnessed a staggering surge in recent years, morphing into a formidable threat in the cyber landscape. When businesses are increasingly reliant on third-party software and open-source components, supply ...

The Secure Java Developer’s Toolkit

Java remains one of the most popular and widely-used programming languages. It’s not just about writing and running Java programs, though. A typical Java developer working in Linux has an entire ecosystem ...
Without and with Code Inventory

Code Inventory: Remove Dead Code for Easier Maintenance

Azul Code Inventory centralizes pinpoints code that doesn’t run in production and provides a treasure map of dead code that you can remove. The post Code Inventory: Remove Dead Code for Easier ...

Changes Included in the Stable release 23.08 of Azul Zulu Prime Builds of OpenJDK

We offer an overview of all the combined improvements in the latest stable release of Azul Platform Prime after the OpenJDK 21 LTS release. The post Changes Included in the Stable release ...