Matt Pavlovich (@mattrpav) 's Twitter Profile
Matt Pavlovich

@mattrpav

CTO at HYTE / hybrid messaging / hybrid microservices / Created atlasmap.io / hiking cycling mountain biking

ID: 35765968

linkhttps://hyte.io calendar_today27-04-2009 15:15:07

981 Tweet

348 Followers

1,1K Following

Christian Schneider (クリス) (@schneider_chris) 's Twitter Profile Photo

@egonwillighagen OSGi News BridgeDb is @[email protected] Sonatype There are several ways. I prefer to use bnd-maven-plugin like this: github.com/cschneider/osg… In a multi module project you only do that on the parent and use bnd.bnd files to configure the bundles.

Matt Pavlovich (@mattrpav) 's Twitter Profile Photo

Ignore the custom Java Agents and the "hot fix" java classes. Set the property at startup to mitigate the security issue: -Dlog4j2.formatMsgNoLookups=true. #log4j #log4j2 #CVE-2021-44228 #log4shell

Gunnar Morling 🌍 (@gunnarmorling) 's Twitter Profile Photo

Proceed with caution when using externally hosted services promising you an easy way to find out whether you're affected by #Log4Shell. Wouldn't be surprised to see kind of "reverse honeypots" popping up, aiming at harvesting addresses of vulnerable systems. #log4jRCE

Matt Pavlovich (@mattrpav) 's Twitter Profile Photo

HYTE Technologies, Inc. latest information on Log4Shell information and impacts to HYTE MQ and Apache ActiveMQ #log4shell #activemq #hytemq hyte.io/cve-2021-44228/

Matt Pavlovich (@mattrpav) 's Twitter Profile Photo

Slack private GitHub repo compromised bleepingcomputer.com/news/security/… We moved to private hosting with #gitea on Kubernetes

Matt Pavlovich (@mattrpav) 's Twitter Profile Photo

I recall reading that Loom favors ReentrantLock vs synchronize. Not sure if that will be the case when finalized, but worth looping back on.

Matt Pavlovich (@mattrpav) 's Twitter Profile Photo

Just submitted OpenJDK enhancement request (#9076208) to define an allow list of CIDR addresses for creating outbound network connections. This would provide immediate mitigation for an entire class of exploits that target Java-based systems.