101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

506
active users

#coldfusion

0 posts0 participants0 posts today
Blake Patterson<p>Not a comforting thing to find in someone's old code you're trying to debug.</p><p><a href="https://oldbytes.space/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://oldbytes.space/tags/code" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>code</span></a> <a href="https://oldbytes.space/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://oldbytes.space/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> <a href="https://oldbytes.space/tags/codecomments" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codecomments</span></a> <a href="https://oldbytes.space/tags/developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developers</span></a> <a href="https://oldbytes.space/tags/screenshot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenshot</span></a></p>
Blake Patterson<p>It occurs to me, a web developer these 25 years, that I am in fact...</p><p>The Gentleman of Shalott</p><p><a href="https://oldbytes.space/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://oldbytes.space/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://oldbytes.space/tags/developer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developer</span></a> <a href="https://oldbytes.space/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://oldbytes.space/tags/www" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>www</span></a> <a href="https://oldbytes.space/tags/coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coldfusion</span></a> <a href="https://oldbytes.space/tags/php" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>php</span></a> <a href="https://oldbytes.space/tags/asp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asp</span></a> <a href="https://oldbytes.space/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://oldbytes.space/tags/webdeveloper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdeveloper</span></a></p>
Java Weekly<p>Lucee: A light-weight dynamic CFML scripting language for the JVM</p><p><a href="https://www.lucee.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">lucee.org/</span><span class="invisible"></span></a></p><p>Discussions: <a href="https://discu.eu/q/https://www.lucee.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discu.eu/q/https://www.lucee.o</span><span class="invisible">rg/</span></a></p><p><a href="https://mastodon.social/tags/coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coldfusion</span></a> <a href="https://mastodon.social/tags/jvm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jvm</span></a> <a href="https://mastodon.social/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a></p>
Zuri (he/him) 🕐 CET<p><span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nixCraft</span></a></span> In the <a href="https://mastodon.online/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> implementation, they wanted to write x[y][z] but autocomplete changed it to x[y][zero], which CF then interpreted as a literal 0 and here we are</p>
Reinald Kirchner<p>Mich wundert ja, das die <a href="https://nrw.social/tags/fdp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fdp</span></a> noch keine Förderung für <a href="https://nrw.social/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> ausgelobt hat 🤣</p>
Zuri (he/him) 🕐 CET<p>I've been <a href="https://mastodon.online/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> for 14 years now, have been using <a href="https://mastodon.online/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a>, <a href="https://mastodon.online/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a>, <a href="https://mastodon.online/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a>, <a href="https://mastodon.online/tags/Ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ruby</span></a>, and whatnot, but holy cow, when reading the following chapter, I've literally been yelling "what the heck" at every second paragraph:</p><p><a href="https://tutorial.ponylang.io/types/traits-and-interfaces" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tutorial.ponylang.io/types/tra</span><span class="invisible">its-and-interfaces</span></a></p><p>I mean, <a href="https://mastodon.online/tags/PonyLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PonyLang</span></a> really tries to explain everything in depth, and I appreciate the effort, but while it works fine in earlier chapters, it confuses the heck out of me in this at length.</p><p><a href="https://mastodon.online/tags/amProgramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amProgramming</span></a> <a href="https://mastodon.online/tags/amCoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amCoding</span></a> <a href="https://mastodon.online/tags/computerScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerScience</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #49/2023 is out! It includes the following and much more:</p><p>➝ 🔓 🧬 <a href="https://infosec.exchange/tags/23andMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>23andMe</span></a> updates user agreement to prevent <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> lawsuits<br>➝ 🔓 🇺🇸 Hackers Exploited <a href="https://infosec.exchange/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> Vulnerability to Breach Federal Agency Servers<br>➝ 🔓 🇺🇸 <a href="https://infosec.exchange/tags/Navy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Navy</span></a> contractor Austal USA confirms <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> after <a href="https://infosec.exchange/tags/dataleak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataleak</span></a><br>➝ 🔓 🇯🇵 <a href="https://infosec.exchange/tags/Nissan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nissan</span></a> is investigating cyberattack and potential data breach<br>➝ 🔓 🇬🇧 Sellafield nuclear site hacked by groups linked to <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> and <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a><br>➝ 🔓 👾 <a href="https://infosec.exchange/tags/Roblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roblox</span></a>, <a href="https://infosec.exchange/tags/Twitch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Twitch</span></a> allegedly targeted by <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> cartel<br>➝ 🇰🇵 N. Korean <a href="https://infosec.exchange/tags/Kimsuky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kimsuky</span></a> Targeting South Korean Research Institutes with <a href="https://infosec.exchange/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> Attacks<br>➝ 🇷🇺 🦠 ITG05 operations leverage <a href="https://infosec.exchange/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a>-<a href="https://infosec.exchange/tags/Hamas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hamas</span></a> conflict lures to deliver Headlace <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a><br>➝ 🇷🇺 Russian military hackers target <a href="https://infosec.exchange/tags/NATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NATO</span></a> fast reaction corps<br>➝ 🇮🇪 🇮🇱 Cyberattack on Irish Utility Cuts Off Water Supply for Two Days<br>➝ 🇷🇺 🇬🇧 Russia hacking: '<a href="https://infosec.exchange/tags/FSB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FSB</span></a> in years-long cyber attacks on UK', says government<br>➝ 🇷🇺 🤖 Russia's AI-Powered Disinformation Operation Targeting <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>, U.S., and <a href="https://infosec.exchange/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a><br>➝ 🇷🇺 📨 <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Warns of Kremlin-Backed <a href="https://infosec.exchange/tags/APT28" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT28</span></a> Exploiting Critical <a href="https://infosec.exchange/tags/Outlook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Outlook</span></a> Vulnerability<br>➝ 🚢 💊 Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports<br>➝ 📱 🕵🏻‍♂️ Governments spying on <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a>, <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> users through push notifications - US senator<br>➝ 🤖 🕵🏻‍♂️ Due to AI, “We are about to enter the era of mass spying,” says Bruce Schneier<br>➝ 🇺🇦 🫡 Ukraine appoints new cyber chief following ouster of top officials<br>➝ 🇳🇴 💰 Norwegian Labor and Welfare Administration fined for data protection failures<br>➝ 🇫🇷 💬 French government recommends against using foreign chat apps<br>➝ 🐛 🛜 "Sierra:21" vulnerabilities impact <a href="https://infosec.exchange/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> routers<br>➝ 🎠 🇹🇭 New Stealthy 'Krasue' <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> Trojan Targeting <a href="https://infosec.exchange/tags/Telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Telecom</span></a> Firms in Thailand<br>➝ 🦠 🤖 SpyLoan <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> malware on Google Play downloaded 12 million times<br>➝ 🦠 <a href="https://infosec.exchange/tags/LogoFAIL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LogoFAIL</span></a>: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks<br>➝ 🔓 💻 Just about every <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> and <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> device vulnerable to new LogoFAIL firmware attack<br>➝ 🔐 💬 <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> Launches Default End-to-End Encryption for Chats and Calls on Messenger<br>➝ 🔐 Addressing post-quantum <a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> with <a href="https://infosec.exchange/tags/CodeQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeQL</span></a><br>➝ 🤖 📨 <a href="https://infosec.exchange/tags/Gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gmail</span></a>’s AI-powered <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spam</span></a> detection is its biggest security upgrade in years<br>➝ 📱 🔓 Your mobile password manager might be exposing your credentials<br>➝ 🐛 <a href="https://infosec.exchange/tags/Qualcomm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualcomm</span></a> Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks</p> <p>📚 This week's recommended reading is: "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" by Dafydd Stuttard</p> <p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-492023" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-492023</span></a></p>
Freemind<p>This exploitation allowed them to drop malware using HTTP POST commands to the directory path associated with ColdFusion.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a> <a href="https://mastodon.online/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://mastodon.online/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a> <a href="https://mastodon.online/tags/Adobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adobe</span></a> <a href="https://mastodon.online/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> <a href="https://mastodon.online/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> </p><p><a href="https://cybersec84.wordpress.com/2023/12/06/critical-coldfusion-vulnerability-exploited-in-federal-agency-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2023/</span><span class="invisible">12/06/critical-coldfusion-vulnerability-exploited-in-federal-agency-breach/</span></a></p>
⊥ᵒᵚ⁄Cᵸᵎᶺᵋᶫ∸ᵒᵘ ☑️<p><span class="h-card"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nixCraft</span></a></span> I still write <a href="https://qoto.org/tags/coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coldfusion</span></a> you insensitive clod :-) </p><p><a href="https://qoto.org/tags/lucee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lucee</span></a> <a href="https://qoto.org/tags/geek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geek</span></a></p>
stux⚡<p>What is the Cyber Trust Mark? &amp; Major ColdFusion &amp; Microsoft Exchange Hacks Underway! </p><p><a href="https://mstdn.social/tags/ThreatWire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatWire</span></a> <a href="https://mstdn.social/tags/Hak5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hak5</span></a> <a href="https://mstdn.social/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> <a href="https://mstdn.social/tags/MicrosoftExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftExchange</span></a></p><p><a href="https://www.youtube.com/watch?v=yoVkxZ8JRcQ" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=yoVkxZ8JRc</span><span class="invisible">Q</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #29/2023 is out! It includes the following and much more:</p><p>➝ 🇷🇺 ⚖️ <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> Seeks 18 Years in Jail for Founder of <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Firm<br>➝ 🇷🇺 🇪🇺 Pro-Russian hacktivists increase focus on Western targets. The latest is <a href="https://infosec.exchange/tags/OnlyFans" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlyFans</span></a><br>➝ 🧨 🤖 <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> Botnets Hijacking <a href="https://infosec.exchange/tags/Zyxel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zyxel</span></a> Devices to Launch Devastating Attacks<br>➝ 🪱 New <a href="https://infosec.exchange/tags/P2PInfect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2PInfect</span></a> Worm Targeting Redis Servers on <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> and <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> Systems<br>➝ 🚫 🛜 <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> restricting internet access to some employees to reduce <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> risk<br>➝ 🇬🇧 🍏 <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> slams UK surveillance-bill proposals<br>➝ 🎭 💸 Cybersecurity firm <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> impersonated by new <a href="https://infosec.exchange/tags/SophosEncrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SophosEncrypt</span></a> ransomware<br>➝ 🇺🇦 🤖 <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> takes down massive bot farm, seizes 150,000 SIM cards<br>➝ 🔐 🛜 <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> and <a href="https://infosec.exchange/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> Issue New Guidance to Strengthen <a href="https://infosec.exchange/tags/5G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a> Network Slicing Against Threats<br>➝ 🇨🇳 🦠 Chinese <a href="https://infosec.exchange/tags/APT41" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT41</span></a> Hackers Target Mobile Devices with New WyrmSpy and DragonEgg <a href="https://infosec.exchange/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a><br>➝ 🇺🇸 🪦 Famed Hacker Kevin Mitnick Dead at 59<br>➝ 🇺🇸 🕵🏻‍♂️ U.S. Government Blacklists <a href="https://infosec.exchange/tags/Cytrox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cytrox</span></a> and <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> Spyware Vendors for Cyber Espionage<br>➝ ☁️ 🔓 <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> alerts users to critical vulnerability in Citrix ADC and Gateway<br>➝ 🔓 📂 <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> Data Leak Exposes Some Registered Customers' Details<br>➝ 🦠 🐈‍⬛ FIN8 Group Using Modified Sardonic <a href="https://infosec.exchange/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> for <a href="https://infosec.exchange/tags/BlackCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCat</span></a> Ransomware Attacks<br>➝ 👤 🔓 <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> Security alert: social engineering campaign targets technology industry employees<br>➝ 🇺🇸 🇨🇳 Analysis of <a href="https://infosec.exchange/tags/Storm0558" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Storm0558</span></a> techniques for unauthorized email access<br>➝ 🇨🇳 ☁️ <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Bug Allowed Hackers to Breach Over Two Dozen Organizations via Forged Azure AD Tokens<br>➝ 🇺🇸 📱 White House, <a href="https://infosec.exchange/tags/FCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FCC</span></a> advance efforts to add security labels to connected devices<br>➝ 🇪🇸 🇺🇦 Police arrests Ukrainian <a href="https://infosec.exchange/tags/scareware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scareware</span></a> developer after 10-year hunt<br>➝ 🇳🇴 💵 <a href="https://infosec.exchange/tags/Norway" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Norway</span></a> Threatens $100,000 Daily Fine on <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> Over Data<br>➝ 🅰️ 🔓 Two New Adobe <a href="https://infosec.exchange/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> Vulnerabilities Exploited in Attacks<br>➝ 🎣 🌍 <a href="https://infosec.exchange/tags/JumpCloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JumpCloud</span></a> Says Sophisticated Nation-State Hackers Targeted Specific Customers<br>➝ 🦠 📊 <a href="https://infosec.exchange/tags/MOVEit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MOVEit</span></a> Hack: Number of Impacted Organizations Exceeds 340</p> <p>📚 This week's recommended reading is: "Leadership Is Changing the Game - The Transition from Technical Expert to Leader" by Brian Donovan</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-292023" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-292023</span></a></p>
IT News<p>Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns - Enlarge (credit: Getty Images) </p><p>Organizations big and small are... - <a href="https://arstechnica.com/?p=1954819" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1954819</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coldfusion</span></a> <a href="https://schleuss.online/tags/netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netscaler</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://schleuss.online/tags/adobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adobe</span></a></p>
Caitlin Condon<p>This was a wild ride. Simplified timeline below, <a href="https://infosec.exchange/tags/Adobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adobe</span></a> <a href="https://infosec.exchange/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> users need to update to the versions released on July 14, NOT the versions released July 11. Active exploitation in multiple Rapid7 customer environments. </p><p>* July 11: July ColdFusion updates go out, including for Rapid7-discovered access control bypass (<a href="https://infosec.exchange/tags/CVE_2023_29298" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE_2023_29298</span></a>)<br>* July 12: Project Discovery blogs an (accidental?) <a href="https://infosec.exchange/tags/0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>0day</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> chain for what will become CVE-2023-38203<br>* July 13: Rapid7 detects exploitation of the two vulns above<br>* July 14: <a href="https://infosec.exchange/tags/CVE_2023_38203" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE_2023_38203</span></a> patched out of band<br>* July 17: Rapid7 finds CVE-2023-29298 patch is incomplete, re-reports to Adobe</p><p>Patching to the July 14 versions should still prevent the attacker behavior <a href="https://infosec.exchange/tags/Rapid7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rapid7</span></a> MDR is seeing since patching the deserialization(s) breaks the chain. </p><p><a href="https://www.rapid7.com/blog/post/2023/07/17/etr-active-exploitation-of-multiple-adobe-coldfusion-vulnerabilities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rapid7.com/blog/post/2023/07/1</span><span class="invisible">7/etr-active-exploitation-of-multiple-adobe-coldfusion-vulnerabilities/</span></a></p>
Alex Furey (TheFakeInYellow)<p>This is my <a href="https://kind.social/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a> post. I definitely did not make any posts before this.</p><p>- He/him<br>- I enjoy <a href="https://kind.social/tags/cooking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cooking</span></a> a lot.<br>- I'm a <a href="https://kind.social/tags/SoftwareEngineer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareEngineer</span></a> doing <a href="https://kind.social/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> and <a href="https://kind.social/tags/mobiledev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobiledev</span></a> (<a href="https://kind.social/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a>, <a href="https://kind.social/tags/JQuery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JQuery</span></a>, <a href="https://kind.social/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a>, <a href="https://kind.social/tags/MySQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MySQL</span></a>, <a href="https://kind.social/tags/MSSQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSSQL</span></a>, <a href="https://kind.social/tags/Flutter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flutter</span></a>, <a href="https://kind.social/tags/Dart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dart</span></a>).<br>- I like <a href="https://kind.social/tags/manga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manga</span></a>, <a href="https://kind.social/tags/anime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anime</span></a>, and <a href="https://kind.social/tags/manhwa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manhwa</span></a>, <a href="https://kind.social/tags/DnD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DnD</span></a>, <a href="https://kind.social/tags/MagicTheGathering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MagicTheGathering</span></a>, <a href="https://kind.social/tags/EDH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDH</span></a>, <a href="https://kind.social/tags/Wildermyth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wildermyth</span></a>, <a href="https://kind.social/tags/LeagueOfLegends" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LeagueOfLegends</span></a> (but ARAM shenanigans only!)<br>- Eclectic music tastes.<br>- Recognizes the benefits of going outside but struggles to do so.<br>- I write lists often.</p>
IT News<p>Another Room-Temperature Superconductivity Claim and Questions of Scientific Integrity - In early March of 2023, a paper was published in Nature, with the researchers clai... - <a href="https://hackaday.com/2023/03/20/another-room-temperature-superconductivity-claim-and-questions-of-scientific-integrity/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/03/20/anothe</span><span class="invisible">r-room-temperature-superconductivity-claim-and-questions-of-scientific-integrity/</span></a> <a href="https://schleuss.online/tags/superconductivity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>superconductivity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/measurement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>measurement</span></a> <a href="https://schleuss.online/tags/coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coldfusion</span></a> <a href="https://schleuss.online/tags/skepticism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>skepticism</span></a> <a href="https://schleuss.online/tags/science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>science</span></a></p>
Opalsec :verified:<p>Get up to speed on the week's infosec news before another week in the trenches:</p><p><a href="https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-e05" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.substack.com/p/soc-gou</span><span class="invisible">lash-weekend-wrap-up-e05</span></a></p><p>Last week's patch Tuesday had SmartScreen bypasses and the Ping of Death, but nothing could beat the <a href="https://infosec.exchange/tags/Outlook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Outlook</span></a> zero-click credential leak that <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> patche-er, uh, wait, no not quite patched - turns out you can still abuse it locally to harvest NTLM credentials, yikes!</p><p>Non-transitive trusts have one job - to enable cross-domain authentication between only the two domains that maintain it. Turns out, that's not the case - you can actually pivot between domains and forests, authenticating to Services well outside the intended scope of the trust. And Microsoft aren't going to fix it.</p><p><a href="https://infosec.exchange/tags/Emotet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emotet</span></a> have realised in week two of their return that there's more to life than Macros, and have joined in the abuse of <a href="https://infosec.exchange/tags/OneNote" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OneNote</span></a> files to deliver their lures.</p><p>In the world of ransomware, <a href="https://infosec.exchange/tags/BianLian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BianLian</span></a> have opted to focus on exfil-and-extortion campaigns, after Avast released a pesky decryptor for their ransomware in January this year. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> have opened their books and shared a detailed profile on <a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockBit</span></a> 3.0's favoured TTPs and tooling that's worth a read.</p><p><a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> TAG have ousted Microsoft taking the easy way out in their previous patch of a SmartScreen bypass, opting to issue a half-baked patch that the <a href="https://infosec.exchange/tags/Magniber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Magniber</span></a> ransomware crew quickly circumvented, enabling them to deliver over 100,000 malicous lures unencumbered by the now-patched security control.</p><p>If you're running Adobe's ColdFusion, Aruba ClearPass, or SAP software - you're going to want to make sure you caught and patched these vulnerabilities that debuted last week.</p><p><a href="https://infosec.exchange/tags/Redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Redteam</span></a> members have a new and improved AD lab environment to play in, as well as new evasion techniques for remote shells and macros to add to the toolkit!</p><p>Offensive Security have a gift for the <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> in the defensive Kali Purple distro, and we've caught a bunch of awesome write-ups to help in scaling Detection Engineering and mitigating common initial access vectors.</p><p>Catch all this and much more in this week's newsletter:</p><p><a href="https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-e05" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.substack.com/p/soc-gou</span><span class="invisible">lash-weekend-wrap-up-e05</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://infosec.exchange/tags/cybernews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybernews</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecnews</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/patchtuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patchtuesday</span></a> <a href="https://infosec.exchange/tags/adobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adobe</span></a> <a href="https://infosec.exchange/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> <a href="https://infosec.exchange/tags/Aruba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aruba</span></a> <a href="https://infosec.exchange/tags/ClearPass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClearPass</span></a> <a href="https://infosec.exchange/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://infosec.exchange/tags/Kali" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kali</span></a></p>
Bill<p>Wait, there is a known exploited vulnerability in COLD FUSION? What decade is it?</p><p><a href="https://coldfusion.adobe.com/2023/03/released-coldfusion-2021-and-2018-march-2023-security-updates/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">coldfusion.adobe.com/2023/03/r</span><span class="invisible">eleased-coldfusion-2021-and-2018-march-2023-security-updates/</span></a></p><p><a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coldfusion</span></a></p>
☮ ♥ ♬ 🧑‍💻<p>A good summary can be found listening to this vidcast summarising the MS vs Alphabet product release: “Google Embarrass Themselves (A.I. War Is Heating Up)” <a href="https://ioc.exchange/tags/Coldfusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coldfusion</span></a> &lt;<a href="https://youtube.com/watch?v=5X1O5AS4nTc" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/watch?v=5X1O5AS4nT</span><span class="invisible">c</span></a>&gt;</p>
ScienceFictionBooks<p><a href="https://bookstodon.com/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a> I'm the author of 100 books on <a href="https://bookstodon.com/tags/Science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Science</span></a> and <a href="https://bookstodon.com/tags/ScienceFiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScienceFiction</span></a>. I love anything <a href="https://bookstodon.com/tags/StarWars" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StarWars</span></a> or <a href="https://bookstodon.com/tags/NASA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NASA</span></a> or <a href="https://bookstodon.com/tags/SpaceX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpaceX</span></a> related. Currently the originator of the idea that we could SOON have Two Suns in the sky by simply using a <a href="https://bookstodon.com/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> jump start on <a href="https://bookstodon.com/tags/Jupiter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jupiter</span></a>. What I call 'The Greatest Achievement in Human history. Check out - The Book To End All Books on <a href="https://bookstodon.com/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> Books ASAP - solution to our <a href="https://bookstodon.com/tags/EnergyCrisis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnergyCrisis</span></a> - OVERNIGHT~! <a href="https://www.amazon.com/dp/B0BL2JMSSJ/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="">amazon.com/dp/B0BL2JMSSJ/</span><span class="invisible"></span></a> Would appreciate some kind <a href="https://bookstodon.com/tags/BookReviews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BookReviews</span></a></p>
MJ :verified:<p><span class="h-card"><a href="https://mastodon.social/@wfaler" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>wfaler</span></a></span> <span class="h-card"><a href="https://fosstodon.org/@alexandru" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alexandru</span></a></span> This could be interesting to see how many things I can remember (and then to look back and realized I’ve forgotten 😂)</p><p><a href="https://techhub.social/tags/java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>java</span></a><br><a href="https://techhub.social/tags/CSharp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSharp</span></a> (or is it <a href="https://techhub.social/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a># 😂)<br><a href="https://techhub.social/tags/PLSql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLSql</span></a><br><a href="https://techhub.social/tags/TransactSql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TransactSql</span></a><br><a href="https://techhub.social/tags/bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bash</span></a><br><a href="https://techhub.social/tags/perl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>perl</span></a><br><a href="https://techhub.social/tags/ksh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ksh</span></a><br><a href="https://techhub.social/tags/VisualBasic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VisualBasic</span></a><br><a href="https://techhub.social/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a><br><a href="https://techhub.social/tags/php" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>php</span></a><br><a href="https://techhub.social/tags/c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c</span></a><br><a href="https://techhub.social/tags/cpp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cpp</span></a><br><a href="https://techhub.social/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a><br><a href="https://techhub.social/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a></p><p>Really looking back at that list, it hasn’t been that many that I’ve used extensively. Have just gone deep in the ones used most. Either with different frameworks or functionality.</p>