programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
I made this thing — clean wrapper for open models, no tracking
(umbraai.xyz)
in programming@programming.dev from xbt@programming.dev on 05 Jul 15:01
comments (1)
in programming@programming.dev from xbt@programming.dev on 05 Jul 15:01
comments (1)
Stabilizing naked functions
(blog.rust-lang.org)
in rust@programming.dev from Blob@programming.dev on 05 Jul 13:57
comments (0)
in rust@programming.dev from Blob@programming.dev on 05 Jul 13:57
comments (0)
Just built Zync — a privacy-first tool to instantly share code, links, or notes (no login)
(zyncshare.vercel.app)
in programming@programming.dev from raw_echo@programming.dev on 05 Jul 07:26
comments (8)
in programming@programming.dev from raw_echo@programming.dev on 05 Jul 07:26
comments (8)
The probability of a hash collision
(kevingal.com)
in programming@programming.dev from learnbyexample@programming.dev on 05 Jul 03:03
comments (4)
in programming@programming.dev from learnbyexample@programming.dev on 05 Jul 03:03
comments (4)
Git experts should try Jujutsu
(pksunkara.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Jul 18:55
comments (18)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Jul 18:55
comments (18)
Hacker leaks Telefónica data allegedly stolen in a new breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 17:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 17:56
comments (0)
Hunters International Ransomware Is Not Shutting Down, It’s Rebranding - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 17:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 17:50
comments (0)
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:34
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:34
comments (8)
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:26
comments (1)
Okta observes v0 AI tool used to build phishing sites | Okta
(www.okta.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:18
comments (0)
hackArcana
(hackarcana.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:08
comments (0)
Recruiting software maker exposes nearly 26M resumes | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:01
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 13:01
comments (2)
IdeaLab confirms data stolen in ransomware attack last year
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:56
comments (0)
New Fake Marketplace From China Mimics Top Retail Brands for Fraud
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:48
comments (0)
Grafana releases critical security update for Image Renderer plugin
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:40
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:40
comments (1)
Linux Users Urged to Patch Critical Sudo CVE - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:32
comments (1)
North Korean Hackers Target Crypto Firms with Novel macOS Malware - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jul 12:25
comments (0)
Literate Programming
(www.literateprogramming.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Jul 10:09
comments (6)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Jul 10:09
comments (6)
Zig 2026 Roadmap Talk
(www.youtube.com)
in programming@programming.dev from PushButton@lemmy.world on 04 Jul 09:13
comments (0)
in programming@programming.dev from PushButton@lemmy.world on 04 Jul 09:13
comments (0)
New Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Finds
(www.silentpush.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 04 Jul 05:47
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 04 Jul 05:47
comments (0)
Writing Code Was Never The Bottleneck
(ordep.dev)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Jul 05:18
comments (30)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Jul 05:18
comments (30)
Need an opinion - STO Y (Y)
in programming@programming.dev from waspentalive@lemmy.world on 04 Jul 04:20
comments (1)
in programming@programming.dev from waspentalive@lemmy.world on 04 Jul 04:20
comments (1)
comment style that tells text editors to fold sections of text
in programming@programming.dev from some@programming.dev on 03 Jul 22:37
comments (9)
in programming@programming.dev from some@programming.dev on 03 Jul 22:37
comments (9)
Rspack - The fast Rust-based web bundler
(rspack.rs)
in rust@programming.dev from cm0002@lemmy.world on 03 Jul 19:56
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 03 Jul 19:56
comments (0)
On Cognitive Alignment
(lambdaisland.com)
in programming@programming.dev from cm0002@lemmy.world on 03 Jul 17:12
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 03 Jul 17:12
comments (0)
Cyberattack on Brazil tech provider affects reserve accounts of some financial institutions
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 16:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 16:39
comments (0)
This Week in Rust 606
(this-week-in-rust.org)
in rust@programming.dev from cm0002@lemmy.world on 03 Jul 15:58
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 03 Jul 15:58
comments (0)
How to manage configuration settings in Go web applications
(www.alexedwards.net)
in golang@programming.dev from cm0002@lemmy.world on 03 Jul 15:31
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 03 Jul 15:31
comments (0)
Gist of Go: Semaphores
(antonz.org)
in golang@programming.dev from cm0002@lemmy.world on 03 Jul 15:30
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 03 Jul 15:30
comments (0)
This Overly Long Variable Name Could Have Been a Comment | Jonathan's Blog
(jonathan-frere.com)
in programming@programming.dev from shape_warrior_t@programming.dev on 03 Jul 14:37
comments (39)
in programming@programming.dev from shape_warrior_t@programming.dev on 03 Jul 14:37
comments (39)
Chinese Hackers Target France in Ivanti Zero-Day Exploit Campaign - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:42
comments (0)
Verizon and T-Mobile Deny Data Breaches as Millions of User Records Sold Online
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:34
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:34
comments (2)
After a hack many firms still say nothing, and that’s a problem - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:24
comments (0)
Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:16
comments (0)
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:08
comments (0)
Data breach likely impacted over 100K Medicare accounts | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 12:01
comments (0)
Bitpanda denies hacker claims of massive data breach | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Jul 11:58
comments (0)
How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets
(trufflesecurity.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 03 Jul 08:38
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 03 Jul 08:38
comments (0)
Pro-Russian hacktivism: Shifting alliances, new groups and risks
(intel471.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 03 Jul 08:24
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 03 Jul 08:24
comments (0)
France: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectors
(www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Jul 06:12
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Jul 06:12
comments (0)
The cost of a missing nil check (Golang)
(discourse.gohugo.io)
in golang@programming.dev from cm0002@lemmy.world on 01 Jul 20:06
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 01 Jul 20:06
comments (0)
Memory-safe malware: Rust challenges security researchers
(www.techzine.eu)
in rust@programming.dev from cm0002@lemmy.world on 01 Jul 19:43
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 01 Jul 19:43
comments (0)
C++ Encounters Of The Rusty Zig Kind
(hackaday.com)
in programming@programming.dev from cm0002@lemmy.world on 01 Jul 19:42
comments (8)
in programming@programming.dev from cm0002@lemmy.world on 01 Jul 19:42
comments (8)
Documentation That Developers Actually Read: The Netflix Approach
(dev.to)
in programming@programming.dev from cm0002@lemmy.world on 01 Jul 15:25
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 01 Jul 15:25
comments (0)
Cl0p data exfiltration tool found vulnerable to RCE attacks • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 15:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 15:41
comments (0)
Drug cartel hacked FBI official’s phone to track and kill informants, report says - Ars Technica
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 15:33
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 15:33
comments (1)
Dozens of fake wallet add-ons flood Firefox store to drain crypto
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 15:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 15:18
comments (0)
Analysis of Attacks Targeting Linux SSH Servers for Proxy Installation - ASEC
(asec.ahnlab.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 14:17
comments (0)
Nessus Vulnerabilities on Windows Enables Arbitrary System File Overwrites
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 14:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 14:09
comments (0)
Crypto Operation Using Fake Investment Platforms Dismantled in Spain
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 14:02
comments (0)
Critical Vulnerability in Microsens Devices Exposes Systems to Hackers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:58
comments (0)
Chrome Zero-Day, 'FoxyWallet' Firefox Attacks Threaten Browsers
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:50
comments (0)
Kelly Benefits says 2024 data breach impacts 550,000 customers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:41
comments (0)
Qantas data breach to impact 6 million airline customers
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 13:33
comments (0)
TIL that RFC 4180 specifies the CSV format to use CRLF line endings
(datatracker.ietf.org)
in programming@programming.dev from JackbyDev@programming.dev on 01 Jul 19:24
comments (7)
in programming@programming.dev from JackbyDev@programming.dev on 01 Jul 19:24
comments (7)
Ransomware Reshaped How Cyber Insurers Perform Security Assessments
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 11:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jul 11:29
comments (0)
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Pro@reddthat.com on 01 Jul 20:58
comments (1)
in cybersecurity@sh.itjust.works from Pro@reddthat.com on 01 Jul 20:58
comments (1)
Johnson Controls starts notifying people affected by 2023 breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 19:53
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 19:53
comments (1)
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 19:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 19:28
comments (0)
Threat Overview - mommy Access Broker
(intel471.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 14:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 14:40
comments (0)
Iran-linked hackers resurface, threaten to release more stolen Trump emails | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 13:16
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 13:16
comments (2)
Airoha Chip Vulnerabilities Expose Headphones to Takeover - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 13:08
comments (0)
AI-Themed SEO Poisoning Attacks Spread Info, Crypto Stealers
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 13:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 13:02
comments (0)
International Criminal Court hit by cyber attack - iTnews
(www.itnews.com.au)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 12:57
comments (0)
Humac Apple reseller targeted by Kraken ransomware | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 12:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 12:42
comments (0)
Switzerland says government data stolen in ransomware attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 12:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 12:28
comments (0)
Actively exploited vulnerability gives extraordinary control over server fleets
(arstechnica.com)
in cybersecurity@sh.itjust.works from KarnaSubarna@lemmy.ml on 30 Jun 18:28
comments (0)
in cybersecurity@sh.itjust.works from KarnaSubarna@lemmy.ml on 30 Jun 18:28
comments (0)
Bluetooth flaws could let hackers spy through your microphone
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:57
comments (1)
CitrixBleed 2 Vulnerability Exploited - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:48
comments (0)
Scattered Spider hackers shift focus to aviation, transportation firms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:41
comments (0)
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:34
comments (0)
Feds Warn Patients, Healthcare Entities of Phishing Scams
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:24
comments (0)
CISA warns of flaws in Mitsubishi Electronics ICS hardware | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:16
comments (0)
Retail giant Ahold Delhaize says data breach affects 2.2 million people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Jun 12:08
comments (0)
Open-source extension showing similar repositories on Github
(github.com)
in programming@programming.dev from Mubelotix@jlai.lu on 30 Jun 06:33
comments (0)
in programming@programming.dev from Mubelotix@jlai.lu on 30 Jun 06:33
comments (0)
Qilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UK
(hackread.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 30 Jun 05:32
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 30 Jun 05:32
comments (0)
Test names should be sentences — Bitfield Consulting
(bitfieldconsulting.com)
in programming@programming.dev from Kissaki@programming.dev on 29 Jun 21:27
comments (5)
in programming@programming.dev from Kissaki@programming.dev on 29 Jun 21:27
comments (5)
Computer specs for compilation times?
in programming@programming.dev from staircase@programming.dev on 29 Jun 15:17
comments (19)
in programming@programming.dev from staircase@programming.dev on 29 Jun 15:17
comments (19)
Go is 80/20 language
(blog.kowalczyk.info)
in golang@programming.dev from cm0002@lemmy.world on 29 Jun 14:17
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 29 Jun 14:17
comments (1)
Flags for discoverable test config in Go
(rednafi.com)
in golang@programming.dev from cm0002@lemmy.world on 29 Jun 14:17
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 29 Jun 14:17
comments (0)
Goldmine in 200 lines of pure JavaScript
(slicker.me)
in programming@programming.dev from monica_b1998@lemmy.world on 29 Jun 04:19
comments (3)
in programming@programming.dev from monica_b1998@lemmy.world on 29 Jun 04:19
comments (3)
Joint Force - Solve puzzles to reunite Belcho and Nim
(rocketnine.itch.io)
in golang@programming.dev from cm0002@lemmy.world on 29 Jun 01:19
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 29 Jun 01:19
comments (0)
JavaScript™ Trademark Update | Deno
(deno.com)
in programming@programming.dev from lena@gregtech.eu on 28 Jun 20:32
comments (13)
in programming@programming.dev from lena@gregtech.eu on 28 Jun 20:32
comments (13)
This Week in Rust 605
(this-week-in-rust.org)
in rust@programming.dev from cm0002@lemmy.world on 28 Jun 16:04
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 28 Jun 16:04
comments (0)
Canada orders China's Hikvision to close Canadian operations over national security concerns
(www.reuters.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Jun 14:09
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Jun 14:09
comments (0)
V2 of my Anonymous, Private, Encrypted text/URL tool, with crazy strong encryption.
in programming@programming.dev from RommieDroid@programming.dev on 28 Jun 13:43
comments (21)
in programming@programming.dev from RommieDroid@programming.dev on 28 Jun 13:43
comments (21)
Application Software Engineer ("such as C++, C, Objective-C, or Swift") - Synth Editors
(inmusicbrands.pinpointhq.com)
in programming@programming.dev from SmartmanApps@programming.dev on 28 Jun 07:03
comments (0)
in programming@programming.dev from SmartmanApps@programming.dev on 28 Jun 07:03
comments (0)
Security Advisory: Airoha-based Bluetooth Headphones and Earbuds
(insinuator.net)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 27 Jun 21:58
comments (0)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 27 Jun 21:58
comments (0)
Lemmy as a discussion forum
in programming@programming.dev from tetrislife@leminal.space on 27 Jun 19:16
comments (22)
in programming@programming.dev from tetrislife@leminal.space on 27 Jun 19:16
comments (22)
Hawaiian Airlines suffers massive IT outage, ransomware attack suspected | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 12:08
comments (0)
Microsoft 365 'Direct Send' abused to send phishing as internal users
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 12:08
comments (0)
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 12:02
comments (0)
Patient Death Linked to NHS Cyber-Attack - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:58
comments (0)
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
(socket.dev)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:50
comments (0)
Odyssey Stealer : The Rebrand Of Poseidon Stealer - Cyfirma
(www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:41
comments (0)
Supply Chain Incident Imperils Glasgow Council Services and Data - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Jun 11:34
comments (0)
Which are your favorite podcasts about programming?
in programming@programming.dev from De_Narm@lemmy.world on 27 Jun 11:18
comments (14)
in programming@programming.dev from De_Narm@lemmy.world on 27 Jun 11:18
comments (14)
Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Study
(www.swp-berlin.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 27 Jun 08:21
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 27 Jun 08:21
comments (1)
Rust 1.88 Released With Improvements For Naked Functions, Chaining Let Statements
(www.phoronix.com)
in rust@programming.dev from cm0002@lemmy.world on 27 Jun 03:20
comments (1)
in rust@programming.dev from cm0002@lemmy.world on 27 Jun 03:20
comments (1)
Announcing Rust 1.88.0 | Rust Blog
(blog.rust-lang.org)
in rust@programming.dev from SorteKanin@feddit.dk on 26 Jun 18:41
comments (11)
in rust@programming.dev from SorteKanin@feddit.dk on 26 Jun 18:41
comments (11)
OpenDylan sheds some parentheses in 2025.1 update
(www.theregister.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Jun 16:18
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 26 Jun 16:18
comments (2)
A QUIC implementation in pure Go
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 15:02
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 15:02
comments (0)
makefile-graph is a Go module and CLI application, which parses GNU Make's internal database and generates a graph
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 15:00
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 15:00
comments (0)
Fang - The CLI starter kit (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 14:58
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 14:58
comments (0)
liminating dead code in Go projects
(mfbmina.dev)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 14:58
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 14:58
comments (0)
JSON evolution in Go: from v1 to v2
(golangweekly.com)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 14:57
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 Jun 14:57
comments (0)
Androxgh0st Continues Exploitation: Operators Compromise a US University For Hosting C2 Logger | CloudSEK
(www.cloudsek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:50
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:50
comments (1)
Surge in MOVEit Transfer Scanning Activity Could Signal Emerging Threat Activity
(www.greynoise.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:41
comments (0)
Glasgow City Council impacted by ‘cyber incident’ | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:32
comments (0)
Cisco warns of critical flaws in Identity Services Engine rated 10.0 | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:25
comments (1)
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:09
comments (0)
Charming Kitten APT Tries Spying on Israeli Cyber Experts
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jun 14:01
comments (0)
You ever write a game where the player walks into a dungeon, gets punched in the face by a goblin, drinks a healing potion like it’s chamomile, and keeps going like nothing happened?
in rust@programming.dev from asyncthoughts@mastodon.social on 20 Jun 15:51
comments (0)
in rust@programming.dev from asyncthoughts@mastodon.social on 20 Jun 15:51
comments (0)
☕ Built LogSniff: a CLI that parses logs, exports to CSV, runs Python ML, and plots anomalies.
in rust@programming.dev from asyncthoughts@mastodon.social on 21 Jun 21:45
comments (0)
in rust@programming.dev from asyncthoughts@mastodon.social on 21 Jun 21:45
comments (0)
Just added some serious discipline to CharmGuard, an open-source focus assistant in !
in rust@programming.dev from asyncthoughts@mastodon.social on 25 Jun 19:35
comments (0)
in rust@programming.dev from asyncthoughts@mastodon.social on 25 Jun 19:35
comments (0)
Open source is a promotion tool
(vitonsky.net)
in programming@programming.dev from vitonsky@programming.dev on 25 Jun 15:41
comments (16)
in programming@programming.dev from vitonsky@programming.dev on 25 Jun 15:41
comments (16)
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 13:25
comments (0)
Introducing FileFix – A New Alternative to ClickFix Attacks
(www.mobile-hacker.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 13:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 13:16
comments (1)
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 13:09
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 13:09
comments (3)
In the Wild: Malware Prototype with Embedded Prompt Injection
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 25 Jun 12:51
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 25 Jun 12:51
comments (0)
OpenAI is Ditching TypeScript to Rebuild Codex CLI with Rust
(analyticsindiamag.com)
in rust@programming.dev from SorteKanin@feddit.dk on 25 Jun 12:46
comments (16)
in rust@programming.dev from SorteKanin@feddit.dk on 25 Jun 12:46
comments (16)
SonicWall warns of trojanized NetExtender stealing VPN logins
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 12:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 12:36
comments (0)
Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:49
comments (23)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:49
comments (23)
Malware Campaign Uses Rogue WordPress Plugin to Skim Credit Cards - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:32
comments (0)
Leak of data belonging to 7.4 million Paraguayans traced back to infostealers | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:26
comments (0)
You may qualify for AT&T's $177 million data breach settlement - how to file a claim today
(www.zdnet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:16
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Jun 11:16
comments (8)
Anthropic won't fix a bug in its SQLite MCP server
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 25 Jun 08:08
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 25 Jun 08:08
comments (0)
PNG is back!
(www.programmax.net)
in programming@programming.dev from jwr1@kbin.earth on 24 Jun 22:28
comments (51)
in programming@programming.dev from jwr1@kbin.earth on 24 Jun 22:28
comments (51)
Siemens Notifies Customers of Microsoft Defender Antivirus Issue
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 17:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 17:46
comments (0)
New FileFix attack weaponizes Windows File Explorer for stealthy commands
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 16:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 16:42
comments (0)
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 13:01
comments (0)
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:57
comments (0)
Prometei Botnet Activity Spikes - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:50
comments (0)
PoC Released for Notepad++ Flaw Enables Privilege Escalation to NT AUTHORITY\SYSTEM
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:40
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:40
comments (1)
Russian court releases several REvil ransomware gang members | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:34
comments (0)
Canada says Salt Typhoon hacked telecom firm via Cisco flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:26
comments (0)
Critical Key Derivation Flaws in pbkdf2 Affect Millions of JavaScript Projects, PoC Available
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:19
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:19
comments (4)
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:10
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:10
comments (2)
The Biggest Chinese Data Leak "Ever"
(spycloud.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:01
comments (0)
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:58
comments (0)
Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:49
comments (0)
Critical Authentication Bypass Flaw Patched in Teleport - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:40
comments (0)
Steel giant Nucor confirms hackers stole data in recent breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:34
comments (0)
Data of more than 740,000 stolen in ransomware attack on Michigan hospital network | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:25
comments (0)
US Warns of Heightened Risk of Iranian Cyber-Attacks After Military St - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:16
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:16
comments (3)
China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19
(www.article19.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 11:10
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 11:10
comments (0)
The Guardian and Cambridge University's Department of Computer Science unveil new secure technology to protect sources
(www.theguardian.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 24 Jun 10:39
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 24 Jun 10:39
comments (0)
Made a way to share links privately
(qrc.site)
in programming@programming.dev from RommieDroid@programming.dev on 24 Jun 09:36
comments (7)
in programming@programming.dev from RommieDroid@programming.dev on 24 Jun 09:36
comments (7)
China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devices
(securityscorecard.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 04:58
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 04:58
comments (0)
Grab, the leading superapp in Southeast Asia, recently rewrote its "Counter Service" using Rust, achieving significant efficiency gains and proving the language's power for high-performance
(engineering.grab.com)
in rust@lemmy.ml from vi21@lemmy.ml on 23 Jun 15:04
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from vi21@lemmy.ml on 23 Jun 15:04
comments (0)
dupe: rust@programming.dev (0)
Typhoon-like gang slinging TLS certificate 'signed' by LAPD
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Jun 00:58
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Jun 00:58
comments (1)
Canadian telecom hacked by suspected China state group
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jun 23:11
comments (5)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jun 23:11
comments (5)
Aflac says it stopped attack launched by ‘sophisticated cybercrime group’ | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:40
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:40
comments (4)
Anubis Ransomware Lists Disneyland Paris as New Victim
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:34
comments (0)
Cloudflare Tunnels Abused in New Malware Campaign - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:25
comments (0)
CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin - Security Boulevard
(securityboulevard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:16
comments (0)
Ransomware Gangs Collapse as Qilin Seizes Control
(www.cybereason.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:08
comments (0)
Russian hackers bypass Gmail MFA using stolen app passwords
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:02
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:02
comments (2)
Oxford City Council suffers breach exposing two decades of data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:58
comments (0)
Hackers Post Dozens of Malicious Copycat Repos to GitHub
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:49
comments (0)
Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:43
comments (0)
WhatsApp messaging app banned on all US House of Representatives devices
(www.theguardian.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Jun 17:29
comments (13)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Jun 17:29
comments (13)
How could I allow users to schedule sending emails at a specific interval?
in programming@programming.dev from lena@gregtech.eu on 23 Jun 15:42
comments (1)
in programming@programming.dev from lena@gregtech.eu on 23 Jun 15:42
comments (1)
How could I allow users to schedule sending emails at a specific interval?
in golang@programming.dev from lena@gregtech.eu on 23 Jun 15:41
comments (14)
in golang@programming.dev from lena@gregtech.eu on 23 Jun 15:41
comments (14)
Canada says Chinese-backed hackers were likely behind recent malicious activity targeting domestic telecommunications infrastructure
(www.insurancejournal.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 23 Jun 15:33
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 23 Jun 15:33
comments (0)
Massive 170K database filled to the brim with plaintext PII exposed
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 11:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 11:13
comments (0)
Does the digital security equilibrium hold under AI?
(www.bsg.ox.ac.uk)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Jun 10:19
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Jun 10:19
comments (0)
How fast are Linux pipes anyway?
(mazzo.li)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 22 Jun 18:06
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 22 Jun 18:06
comments (0)
Announcing the Clippy feature freeze
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 22 Jun 18:01
comments (0)
in rust@programming.dev from neme@lemm.ee on 22 Jun 18:01
comments (0)
Disinformation for beginners: How access to TikTok is threatening European security
(ecfr.eu)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 Jun 17:03
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 Jun 17:03
comments (0)
Finding the right balance between DDD, Clean and Hexagonal architectures
(dev.to)
in programming@programming.dev from pylapp@programming.dev on 22 Jun 15:11
comments (0)
in programming@programming.dev from pylapp@programming.dev on 22 Jun 15:11
comments (0)
Writing Toy Software Is A Joy
(www.jsbarretto.com)
in programming@programming.dev from learnbyexample@programming.dev on 22 Jun 11:50
comments (5)
in programming@programming.dev from learnbyexample@programming.dev on 22 Jun 11:50
comments (5)
Revisiting Knuth's 'Premature Optimization' Paper
(probablydance.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 22 Jun 06:23
comments (13)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 22 Jun 06:23
comments (13)
AI Models from Google, OpenAI, Anthropic Solve 0% of ‘Hard’ Coding Problems
(analyticsindiamag.com)
in programming@programming.dev from cm0002@lemmy.world on 22 Jun 05:59
comments (84)
in programming@programming.dev from cm0002@lemmy.world on 22 Jun 05:59
comments (84)
Cyber Security Card Game
in cybersecurity@sh.itjust.works from LockheedTheDragon@lemmy.world on 21 Jun 20:13
comments (7)
in cybersecurity@sh.itjust.works from LockheedTheDragon@lemmy.world on 21 Jun 20:13
comments (7)
If Your Kernel Development Is A Little Rusty
(hackaday.com)
in rust@programming.dev from cm0002@lemmy.world on 21 Jun 17:57
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 21 Jun 17:57
comments (0)
Hare 0.25.2 released
(harelang.org)
in programming@programming.dev from rwnobrega@lemmy.world on 21 Jun 12:18
comments (0)
in programming@programming.dev from rwnobrega@lemmy.world on 21 Jun 12:18
comments (0)
JavaScript broke the web (and called it progress)
(www.jonoalderson.com)
in programming@programming.dev from pylapp@programming.dev on 21 Jun 08:17
comments (58)
in programming@programming.dev from pylapp@programming.dev on 21 Jun 08:17
comments (58)
Entangled: Literate Programming in Markdown
(entangled.github.io)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 21 Jun 05:34
comments (1)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 21 Jun 05:34
comments (1)
Github has started charging me on the free tier?
in programming@programming.dev from mesamunefire@piefed.social on 20 Jun 18:33
comments (28)
in programming@programming.dev from mesamunefire@piefed.social on 20 Jun 18:33
comments (28)
Banana Squad’s Stealthy GitHub Malware Campaign Targets Devs - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:50
comments (0)
Godfather Android malware now uses virtualization to hijack banking apps
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:40
comments (0)
UBS Employee Data Reportedly Exposed in Third Party Attack - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:34
comments (0)
Krispy Kreme says November data breach impacts over 160,000 people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:26
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:26
comments (4)
UK Passes Data Use and Access Regulation Bill
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:16
comments (1)
The Hidden Threat: How DanaBot Malware Facilitated Data Theft and Russian State-Sponsored Spying
(www.rferl.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Jun 04:59
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Jun 04:59
comments (0)
No, the 16 billion credentials leak is not a new data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 00:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 00:26
comments (0)
pasejo: CLI password manager using age
(github.com)
in rust@lemmy.ml from seb@lemmy.ml on 19 Jun 16:54
comments (0)
in rust@lemmy.ml from seb@lemmy.ml on 19 Jun 16:54
comments (0)
The ultimate Rust performance guide
(www.youtube.com)
in rust@programming.dev from clot27@lemmy.zip on 19 Jun 14:59
comments (4)
in rust@programming.dev from clot27@lemmy.zip on 19 Jun 14:59
comments (4)
Literature review on the benefits of static types, by Dan Luu
(danluu.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 19 Jun 11:59
comments (84)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 19 Jun 11:59
comments (84)
Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
[Solved] Python question: How to convert list to sort with multiple keys?
in programming@programming.dev from thingsiplay@beehaw.org on 19 Jun 07:51
comments (4)
in programming@programming.dev from thingsiplay@beehaw.org on 19 Jun 07:51
comments (4)
analogatique · web gallery for your photos
(github.com)
in rust@lemmy.ml from un1970ix@lemmy.ml on 18 Jun 12:13
comments (0)
in rust@lemmy.ml from un1970ix@lemmy.ml on 18 Jun 12:13
comments (0)
Rust compiler performance survey 2025
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 18 Jun 20:05
comments (0)
in rust@programming.dev from neme@lemm.ee on 18 Jun 20:05
comments (0)