programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
How do you do, fellow web developers? A growing disconnect.
(rakhim.exotext.com)
in programming@programming.dev from tja@sh.itjust.works on 24 Dec 13:52
comments (6)
in programming@programming.dev from tja@sh.itjust.works on 24 Dec 13:52
comments (6)
I made a guess game in Rust :D
in rust@programming.dev from kionite231@lemmy.ca on 24 Dec 12:29
comments (12)
in rust@programming.dev from kionite231@lemmy.ca on 24 Dec 12:29
comments (12)
Conversation with a “Nam3L3ss” Watchdog: Preface
(databreaches.net)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 24 Dec 04:33
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 24 Dec 04:33
comments (0)
Burnout ≠ Working Too Much
(terriblesoftware.org)
in programming@programming.dev from chaospatterns@lemmy.world on 23 Dec 23:30
comments (9)
in programming@programming.dev from chaospatterns@lemmy.world on 23 Dec 23:30
comments (9)
Suspected LockBit dev faces extradition to the US
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Dec 14:45
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Dec 14:45
comments (1)
Top 5 Ransomware Attacks and Data Breaches of 2024 - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:12
comments (0)
Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (0)
BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (2)
NotLockBit: New Cross-Platform Ransomware Threatens Windows and macOS
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:10
comments (0)
US hospital operator Ascension says 5.6 million affected in medical data breach in May
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:08
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:08
comments (2)
North Korean hackers stole $1.3 billion worth of crypto this year
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:07
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:07
comments (2)
Unnecessary Optimization in Rust: Hamming Distances, SIMD, and Auto-Vectorization
(emschwartz.me)
in rust@programming.dev from arendjr@programming.dev on 23 Dec 09:36
comments (2)
in rust@programming.dev from arendjr@programming.dev on 23 Dec 09:36
comments (2)
Rust code to find palindrome string in rust
in rust@programming.dev from kionite231@lemmy.ca on 23 Dec 08:55
comments (13)
in rust@programming.dev from kionite231@lemmy.ca on 23 Dec 08:55
comments (13)
How bloom filters made SQLite 10x faster
(avi.im)
in programming@programming.dev from rimu@piefed.social on 22 Dec 23:01
comments (10)
in programming@programming.dev from rimu@piefed.social on 22 Dec 23:01
comments (10)
Has anyone been able to pull from PGEs API or use their system to get the current power usage?
in programming@programming.dev from mesamunefire@lemmy.world on 22 Dec 00:14
comments (5)
in programming@programming.dev from mesamunefire@lemmy.world on 22 Dec 00:14
comments (5)
four years after adding it, curl/libcurl has removed its rust backend for HTTP/1: "with no user demand, why do it?"
(daniel.haxx.se)
in rust@lemmy.ml from cypherpunks@lemmy.ml on 21 Dec 13:32
comments (0)
in rust@lemmy.ml from cypherpunks@lemmy.ml on 21 Dec 13:32
comments (0)
Learning Rust
in rust@lemmy.ml from kionite231@lemmy.ca on 21 Dec 09:00
comments (0)
in rust@lemmy.ml from kionite231@lemmy.ca on 21 Dec 09:00
comments (0)
4.5 Million (Suspected) Fake Stars in GitHub: A Growing Spiral of Popularity Contests, Scams, and Malware
(arxiv.org)
in programming@programming.dev from mox@lemmy.sdf.org on 21 Dec 21:06
comments (8)
in programming@programming.dev from mox@lemmy.sdf.org on 21 Dec 21:06
comments (8)
Blade-graphics-0.6 release
(github.com)
in rust@programming.dev from kvark@programming.dev on 21 Dec 18:35
comments (0)
in rust@programming.dev from kvark@programming.dev on 21 Dec 18:35
comments (0)
nano-queries - Simple and powerful database-agnostic Query Builder for TypeScript (work with SQLite, Postgres, GraphQL, Redis, PGlite, etc)
(github.com)
in programming@programming.dev from vitonsky@programming.dev on 21 Dec 16:51
comments (4)
in programming@programming.dev from vitonsky@programming.dev on 21 Dec 16:51
comments (4)
Make a Roku channel Part 1 - Hello World
(1hitsong.github.io)
in programming@programming.dev from 1hitsong@lemmy.ml on 21 Dec 14:37
comments (0)
in programming@programming.dev from 1hitsong@lemmy.ml on 21 Dec 14:37
comments (0)
Common Misconceptions about Compilers
(sbaziotis.com)
in programming@programming.dev from learnbyexample@programming.dev on 21 Dec 13:42
comments (6)
in programming@programming.dev from learnbyexample@programming.dev on 21 Dec 13:42
comments (6)
(probably not) Microsoft bought "codeburg.org" and redirects it to github.
in programming@programming.dev from rutrum@lm.paradisus.day on 21 Dec 12:37
comments (29)
in programming@programming.dev from rutrum@lm.paradisus.day on 21 Dec 12:37
comments (29)
Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:08
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:08
comments (3)
Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:08
comments (0)
Python-Based NodeStealer Version Targets Facebook Ads Manager
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:06
comments (0)
Lazarus targets nuclear-related organization with new malware
(securelist.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:06
comments (0)
New Malware Can Kill Engineering Processes in ICS Environments
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:04
comments (0)
Rising wave of cyber-attacks targeting YouTube content creators
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:04
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:04
comments (4)
Ransomware Attackers Target Industries with Low Downtime Tolerance
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 14:02
comments (0)
Don't DRY Your Code Prematurely
(testing.googleblog.com)
in programming@programming.dev from hono4kami@piefed.social on 20 Dec 09:46
comments (30)
in programming@programming.dev from hono4kami@piefed.social on 20 Dec 09:46
comments (30)
Zero Bugs
(bugs.rocicorp.dev)
in programming@programming.dev from arendjr@programming.dev on 20 Dec 09:13
comments (3)
in programming@programming.dev from arendjr@programming.dev on 20 Dec 09:13
comments (3)
Greppability is an underrated code metric
(morizbuesing.com)
in programming@programming.dev from hono4kami@piefed.social on 20 Dec 07:59
comments (20)
in programming@programming.dev from hono4kami@piefed.social on 20 Dec 07:59
comments (20)
#bjForth v0.0.2 is here!
(github.com)
in programming@programming.dev from bahmanm@lemmy.ml on 20 Dec 04:22
comments (7)
in programming@programming.dev from bahmanm@lemmy.ml on 20 Dec 04:22
comments (7)
Go generics: can I do this?
in golang@programming.dev from sxan@midwest.social on 20 Dec 02:26
comments (1)
in golang@programming.dev from sxan@midwest.social on 20 Dec 02:26
comments (1)
CERT-UA: Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:18
comments (0)
BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:12
comments (0)
CISA Releases Draft of National Cyber Incident Response Plan
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:09
comments (0)
Fortinet warns of FortiWLM bug giving hackers admin privileges
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:08
comments (0)
Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 18:01
comments (0)
Tailwind CSS v4.0 Beta
(tailwindcss.com)
in programming@programming.dev from hono4kami@slrpnk.net on 19 Dec 16:13
comments (2)
in programming@programming.dev from hono4kami@slrpnk.net on 19 Dec 16:13
comments (2)
[Computerphile] XZ Exploit
(inv.nadeko.net)
in programming@programming.dev from recursive_recursion@lemmy.ca on 19 Dec 15:36
comments (1)
in programming@programming.dev from recursive_recursion@lemmy.ca on 19 Dec 15:36
comments (1)
Okta Social Engineering Impersonation Report - Response and Recommendation
(sec.okta.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 13:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 13:24
comments (0)
BeyondTrust Patches Critical Vulnerability Discovered During Security Incident Probe
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:27
comments (0)
CISA Releases Best Practice Guidance for Mobile Communications
(www.cisa.gov)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:13
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:13
comments (3)
Thousands of users in Europe getting malicious emails with DocuSign-enabled PDFs
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:12
comments (0)
US considers banning TP-Link routers over cybersecurity risks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:02
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:02
comments (8)
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 12:01
comments (0)
Ibis release 0.2.0 - Federated Wiki with Shiny Redesign
(ibis.wiki)
in rust@programming.dev from nutomic@lemmy.ml on 18 Dec 20:19
comments (0)
dupe: rust@lemmy.ml (0)
in rust@programming.dev from nutomic@lemmy.ml on 18 Dec 20:19
comments (0)
dupe: rust@lemmy.ml (0)
Hackers Exploiting Linux eBPF Tech to Spread Malware in Ongoing Campaign
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 17:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 17:50
comments (2)
Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:27
comments (0)
Xloader Malware Delivered via Sophisticated SharePoint Attack
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:25
comments (0)
RCE and DoS Vulnerabilities Addressed in Apache Tomcat: CVE-2024-50379 and CVE-2024-54677
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:24
comments (0)
CISA orders federal agencies to secure Microsoft 365 tenants
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 13:22
comments (0)
U.S. Weighs Ban on Chinese-Made Router in Millions of American Homes
(www.wsj.com)
in cybersecurity@sh.itjust.works from ptz@dubvee.org on 18 Dec 12:59
comments (23)
in cybersecurity@sh.itjust.works from ptz@dubvee.org on 18 Dec 12:59
comments (23)
A first release candidate for axum v0.8.0 is out - please try it!
(github.com)
in rust@lemmy.ml from jplatte@discuss.tchncs.de on 17 Dec 23:10
comments (0)
in rust@lemmy.ml from jplatte@discuss.tchncs.de on 17 Dec 23:10
comments (0)
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7
(www.404media.co)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 11:53
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 11:53
comments (8)
Sophisticated TA397 Malware Targets Turkish Defense Sector
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 11:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 11:51
comments (0)
'Bitter' cyberspies target defense orgs with new MiyaRAT malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 11:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 11:51
comments (0)
Network protocols for anyone who knows a programming language (2017)
(www.destroyallsoftware.com)
in programming@programming.dev from mox@lemmy.sdf.org on 18 Dec 05:18
comments (2)
in programming@programming.dev from mox@lemmy.sdf.org on 18 Dec 05:18
comments (2)
bjForth Java Interop
in programming@programming.dev from bahmanm@lemmy.ml on 18 Dec 04:59
comments (1)
in programming@programming.dev from bahmanm@lemmy.ml on 18 Dec 04:59
comments (1)
GOLDILOCKER Brain Wallet - Generate OpenSSL Goldilocks Elliptic Curve Keys from Seed Phrase
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:45
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:45
comments (0)
KSRNG - Key Strike Random Generator (version 0.0.1)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:29
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:29
comments (0)
MEGARAND Extreme Overkill Random Seed Generator
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:27
comments (2)
in cryptography@lemmy.ml from octade@soc.octade.net on 17 Dec 23:27
comments (2)
Critical Apache Struts bug under active exploit
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Dec 23:27
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Dec 23:27
comments (0)
WSL documentation fix initially rejected because AI has difficulty understanding markdown tables
(github.com)
in programming@programming.dev from e8d79@discuss.tchncs.de on 17 Dec 22:29
comments (16)
in programming@programming.dev from e8d79@discuss.tchncs.de on 17 Dec 22:29
comments (16)
Hackers Leak Partial Cisco Data from 4.5TB of Exposed Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 19:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 19:46
comments (0)
Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 16:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 16:50
comments (2)
Over 25,000 SonicWall VPN Firewalls exposed to critical flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 16:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 16:50
comments (0)
I built an end-to-end data pipeline tool in Go called Bruin
(github.com)
in programming@programming.dev from denizhdz@programming.dev on 17 Dec 14:22
comments (0)
in programming@programming.dev from denizhdz@programming.dev on 17 Dec 14:22
comments (0)
Do you know how to use Feedbacks in LibAFL?
(docs.rs)
in rust@programming.dev from ExperimentalGuy@programming.dev on 17 Dec 13:30
comments (0)
in rust@programming.dev from ExperimentalGuy@programming.dev on 17 Dec 13:30
comments (0)
Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 13:04
comments (0)
Cicada3301 Ransomware Claims Attack on French Peugeot Dealership
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:47
comments (0)
FBI spots HiatusRAT malware attacks targeting web cameras, DVRs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:45
comments (0)
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials
(securitylabs.datadoghq.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:42
comments (0)
US Unveils New National Cyber Incident Response Plan
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:40
comments (0)
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
(www.cadosecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:38
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Dec 11:38
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
Puppet is getting forked
(fosstodon.org)
in programming@programming.dev from mesamunefire@lemmy.world on 17 Dec 03:23
comments (12)
in programming@programming.dev from mesamunefire@lemmy.world on 17 Dec 03:23
comments (12)
Ransomware attacks exploit Cleo bug as Cl0p claims it
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Dec 00:40
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Dec 00:40
comments (0)
Go Protobuf: The new Opaque API
(go.dev)
in golang@programming.dev from neme@lemm.ee on 17 Dec 00:38
comments (0)
in golang@programming.dev from neme@lemm.ee on 17 Dec 00:38
comments (0)
The World Depends on 60-Year-Old Code No One Knows Anymore (COBOL History lesson)
(www.youtube.com)
in programming@programming.dev from mesamunefire@lemmy.world on 16 Dec 22:05
comments (96)
in programming@programming.dev from mesamunefire@lemmy.world on 16 Dec 22:05
comments (96)
Windows kernel bug now exploited in attacks to gain SYSTEM privileges
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 20:55
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 20:55
comments (1)
November project goals update
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 16 Dec 20:13
comments (4)
in rust@programming.dev from neme@lemm.ee on 16 Dec 20:13
comments (4)
Multiple flaws in Volkswagen Group's infotainment unit allow for vehicle compromise
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 17:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 17:18
comments (0)
Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 17:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 17:15
comments (0)
New Android NoviSpy spyware linked to Qualcomm zero-day bugs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 17:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 17:07
comments (0)
Coder wrote a bug so bad security guards wanted a word
(www.theregister.com)
in programming@programming.dev from cm0002@lemmy.world on 16 Dec 15:14
comments (11)
in programming@programming.dev from cm0002@lemmy.world on 16 Dec 15:14
comments (11)
Canadian Eyecare Firm Care1 Exposes 2.2TB of Patient Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:32
comments (1)
Microsoft Confirms Critical Windows Defender Security Vulnerability
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:31
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:31
comments (6)
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:23
comments (0)
Over 300,000 Prometheus Servers Vulnerable to DoS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:22
comments (0)
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:21
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:21
comments (2)
Citrix shares mitigations for ongoing Netscaler password spray attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:20
comments (0)
Clop ransomware claims responsibility for Cleo data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:19
comments (0)
Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:18
comments (0)
Akira and RansomHub Surge as Ransomware Claims Reach All-Time High
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:17
comments (0)
Researchers Discover Malware Used by Nation-Sates to Attack OT Systems
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:16
comments (0)
390,000 WordPress accounts stolen from hackers in supply chain attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Dec 11:16
comments (1)
I built a full-stack app, how should I host it?
in programming@programming.dev from echodrift@programming.dev on 15 Dec 22:52
comments (8)
in programming@programming.dev from echodrift@programming.dev on 15 Dec 22:52
comments (8)
Cryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentation
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:25
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:25
comments (0)
Hexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabet
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:17
comments (0)
in cryptography@lemmy.ml from octade@soc.octade.net on 15 Dec 14:17
comments (0)
Need some help in understanding how to read some parts of library pages (std::process)
in rust@lemmy.ml from dontblink@feddit.it on 14 Dec 12:05
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 14 Dec 12:05
comments (0)
I present: Managarr with Sonarr support!
(github.com)
in rust@lemmy.ml from aclarke@lemmy.world on 14 Dec 08:13
comments (0)
in rust@lemmy.ml from aclarke@lemmy.world on 14 Dec 08:13
comments (0)
Messing with MIDI files and soundfonts
(github.com)
in rust@programming.dev from sevon@lemmy.kde.social on 14 Dec 15:39
comments (3)
in rust@programming.dev from sevon@lemmy.kde.social on 14 Dec 15:39
comments (3)
Same Stats, Different Improvements
in programming@programming.dev from LabPlot@floss.social on 14 Dec 14:54
comments (7)
in programming@programming.dev from LabPlot@floss.social on 14 Dec 14:54
comments (7)
UK police chief asks China to stop exporting engines used for small boats
(www.yahoo.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 14 Dec 13:38
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 14 Dec 13:38
comments (0)
I present: Managarr with Sonarr support!
in rust@programming.dev from aclarke@lemmy.world on 14 Dec 08:13
comments (0)
in rust@programming.dev from aclarke@lemmy.world on 14 Dec 08:13
comments (0)
diskonaut is ncdu, but with better visualization & Rust
(github.com)
in programming@programming.dev from verstra@programming.dev on 13 Dec 15:08
comments (14)
in programming@programming.dev from verstra@programming.dev on 13 Dec 15:08
comments (14)
Bottom-up Javascript Storage Management
(positive-intentions.com)
in programming@programming.dev from xoron@programming.dev on 13 Dec 11:26
comments (0)
in programming@programming.dev from xoron@programming.dev on 13 Dec 11:26
comments (0)
Check if a nested chain of objects is valid in BrightScript
(1hitsong.github.io)
in programming@programming.dev from 1hitsong@lemmy.ml on 12 Dec 22:32
comments (2)
in programming@programming.dev from 1hitsong@lemmy.ml on 12 Dec 22:32
comments (2)
Dear OAuth Providers
(pilcrowonpaper.com)
in programming@programming.dev from chaospatterns@lemmy.world on 12 Dec 18:41
comments (12)
in programming@programming.dev from chaospatterns@lemmy.world on 12 Dec 18:41
comments (12)
Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 16:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 16:50
comments (0)
Apache issues patches for critical Struts 2 RCE bug
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 12 Dec 14:55
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 12 Dec 14:55
comments (0)
Splunk RCE Vulnerability Let Attackers Execute Remote Code
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 11:49
comments (0)
Inside Zloader’s Latest Trick: DNS Tunneling
(www.zscaler.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 11:48
comments (0)
French internet operator fined $53 million for unsolicited ads and tracking users without consent
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 11:42
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Dec 11:42
comments (8)
Russia takes unusual route to hack Starlink-connected devices in Ukraine
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 12 Dec 00:45
comments (2)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 12 Dec 00:45
comments (2)
A helper function to check if many things are valid in BrightScript
(1hitsong.github.io)
in programming@programming.dev from 1hitsong@lemmy.ml on 12 Dec 00:02
comments (2)
in programming@programming.dev from 1hitsong@lemmy.ml on 12 Dec 00:02
comments (2)
Cheap Phone Scanner Shows Lots Of People Are Still Being Targeted By NSO Group Spyware
(www.techdirt.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 11 Dec 22:17
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 11 Dec 22:17
comments (0)
Researchers Crack Microsoft Azure MFA in an Hour
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Dec 21:52
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Dec 21:52
comments (0)
Symmetrical Cryptography Pioneer Targets Post-Quantum Era
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Dec 21:51
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Dec 21:51
comments (0)
How AMD Is Taking Standard C/C++ Code To Run Directly On GPUs
(www.phoronix.com)
in programming@programming.dev from mox@lemmy.sdf.org on 11 Dec 21:13
comments (5)
in programming@programming.dev from mox@lemmy.sdf.org on 11 Dec 21:13
comments (5)
Operation PowerOFF shuts down 27 DDoS-for-hire platforms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 17:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 17:47
comments (0)
New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 16:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 16:42
comments (0)
AuthQuake Flaw Allowed MFA Bypass Across Azure, Office 365 Accounts
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 16:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 16:29
comments (0)
3D printing and coding my Mini Macro Pad
(www.ssebs.com)
in programming@programming.dev from DichotoDeezNutz@lemmy.world on 11 Dec 16:12
comments (0)
in programming@programming.dev from DichotoDeezNutz@lemmy.world on 11 Dec 16:12
comments (0)
Is it a bad idea to go on with a pixel 4a?
in cybersecurity@sh.itjust.works from MTK@lemmy.world on 11 Dec 15:16
comments (10)
in cybersecurity@sh.itjust.works from MTK@lemmy.world on 11 Dec 15:16
comments (10)
Learning LLVM (Part-1) - Writing a simple LLVM pass
(sh4dy.com)
in programming@programming.dev from learnbyexample@programming.dev on 11 Dec 14:41
comments (0)
in programming@programming.dev from learnbyexample@programming.dev on 11 Dec 14:41
comments (0)
Windows RDP Service Flaw let Hackers Execute Remote Code
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 14:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 14:20
comments (1)
FYI OpenCVE 2.0 Opensource Vulnerability Management Platform is out
(www.opencve.io)
in cybersecurity@sh.itjust.works from M33@lemmy.sdf.org on 11 Dec 13:06
comments (0)
in cybersecurity@sh.itjust.works from M33@lemmy.sdf.org on 11 Dec 13:06
comments (0)
Digital consumption keeps me from getting better at my job
(sibervepunk.com)
in programming@programming.dev from greywolf0x1@lemmy.ml on 11 Dec 12:04
comments (13)
in programming@programming.dev from greywolf0x1@lemmy.ml on 11 Dec 12:04
comments (13)
Dell Warns of Critical Code Execution Vulnerability in Power Manager
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:43
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:43
comments (1)
U.S. CISA adds Microsoft Windows CLFS driver flaw to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:39
comments (0)
Black Basta Gang Uses MS Teams, Email Bombing to Spread Malware
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:37
comments (0)
Researcher Details CVE-2024-44131 - A Critical TCC Bypass in macOS and iOS
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:36
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:36
comments (1)
Google Chrome Patches High-Severity Vulnerabilities - CVE-2024-12381 & CVE-2024-12382
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:35
comments (0)
Mitigating NTLM Relay Attacks by Default | MSRC Blog | Microsoft Security Response Center
(msrc.microsoft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:31
comments (0)
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels
(www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Dec 11:30
comments (0)
Introducing Limbo: A complete rewrite of SQLite in Rust
(turso.tech)
in rust@programming.dev from snaggen@programming.dev on 11 Dec 06:47
comments (3)
in rust@programming.dev from snaggen@programming.dev on 11 Dec 06:47
comments (3)
Drew DeVault's blog — I'm daily driving Jujutsu, and maybe you should too
(web.archive.org)
in programming@programming.dev from 2xsaiko@discuss.tchncs.de on 11 Dec 02:19
comments (8)
in programming@programming.dev from 2xsaiko@discuss.tchncs.de on 11 Dec 02:19
comments (8)
Hackers Exploit AWS Misconfigurations in Massive Data Breach
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 19:24
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 19:24
comments (4)
Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 18:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 18:45
comments (0)
AMD’s trusted execution environment blown wide open by new BadRAM attack
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 18:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 18:32
comments (0)
Microsoft 365 outage takes down Office web apps, admin center
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 13:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 13:42
comments (0)
WhatsApp patches View Once flaw exposing vanishing media
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:47
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:47
comments (2)
'Operation Digital Eye' Attack Targets European IT Orgs
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:45
comments (0)
Ongoing Phishing and Malware Campaigns in December 2024
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:44
comments (0)
Deloitte responds to ransomware claims, says one client system involved
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:43
comments (0)
Microsoft NTLM Zero-Day to Remain Unpatched Until April
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:41
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:41
comments (2)
Mysterious Drone-Like Objects Disrupting Electronics in New Jersey
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:39
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:39
comments (6)
Ransomware attack hits leading heart surgery device maker
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:36
comments (0)
Radiant links $50 million crypto heist to North Korean hackers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:35
comments (0)
Russian hacktivists target oil, gas and water sectors worldwide
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:33
comments (2)
OpenWrt supply chain attack scare prompts urgent upgrades
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Dec 11:32
comments (0)
"Finding your way around the Fediverse" recording
in programming@programming.dev from SmartmanApps@programming.dev on 10 Dec 05:52
comments (0)
in programming@programming.dev from SmartmanApps@programming.dev on 10 Dec 05:52
comments (0)
How to develop a good website
(iamkate.com)
in programming@programming.dev from Robbo@feddit.uk on 10 Dec 00:20
comments (2)
in programming@programming.dev from Robbo@feddit.uk on 10 Dec 00:20
comments (2)
LazyVim for Ambitious Devs (aka: lazyvim, instead of vim → neovim → lazyvim)
(lazyvim-ambitious-devs.phillips.codes)
in programming@programming.dev from fool@programming.dev on 09 Dec 22:52
comments (0)
in programming@programming.dev from fool@programming.dev on 09 Dec 22:52
comments (0)
Romanian energy supplier Electrica hit by ransomware attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 18:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 18:46
comments (0)
DaMAgeCard SD Express card vulnerability leverages the privileged access that PCIe provides — bypasses traditional software-based security mechanisms
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Dec 13:34
comments (7)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Dec 13:34
comments (7)
Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:11
comments (0)
RedLine info-stealer campaign targets Russian businesses
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:10
comments (0)
New Transaction-Relay Jamming Vulnerability Let Attackers Exploits Bitcoin Nodes
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:09
comments (0)
New DroidBot Android Spyware Targeting Banking and Crypto Users
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:08
comments (0)
Texas Teen Arrested for Scattered Spider Telecom Hacks
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:07
comments (0)
Russian Hacktivists Target Energy And Water Infrastructure
(cyble.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Dec 12:04
comments (0)
"Stick Champ" game in 90 lines of pure #JavaScript
(slicker.me)
in programming@programming.dev from monica_b1998@programming.dev on 09 Dec 04:00
comments (2)
in programming@programming.dev from monica_b1998@programming.dev on 09 Dec 04:00
comments (2)
Zero-day Windows NTLM hash vulnerability gets patched by third-party —credentials can be hijacked by merely viewing a malicious file in File Explorer
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 08 Dec 23:18
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 08 Dec 23:18
comments (0)
need advices
in programming@programming.dev from hungrythirstyhorny@lemmy.world on 08 Dec 05:57
comments (54)
in programming@programming.dev from hungrythirstyhorny@lemmy.world on 08 Dec 05:57
comments (54)
Tracking issue for RFC 3681: Default field values · Issue #132162 · rust-lang/rust
(github.com)
in rust@programming.dev from Apoplexy@lemmy.world on 08 Dec 01:06
comments (6)
in rust@programming.dev from Apoplexy@lemmy.world on 08 Dec 01:06
comments (6)
Romania's election systems targeted in over 85,000 cyberattacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 07 Dec 23:15
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 07 Dec 23:15
comments (0)
When LLM gives you "{ }"
in programming@programming.dev from chevy9294@monero.town on 07 Dec 20:08
comments (2)
in programming@programming.dev from chevy9294@monero.town on 07 Dec 20:08
comments (2)
Rustc Trait System Refactor Initiative Update: Stabilizing `-Znext-solver=coherence` | Inside Rust Blog
(blog.rust-lang.org)
in rust@programming.dev from Apoplexy@lemmy.world on 07 Dec 18:30
comments (1)
in rust@programming.dev from Apoplexy@lemmy.world on 07 Dec 18:30
comments (1)
I'm just building my first CRUD app in Rust coming from Python what do I need to know?
in rust@programming.dev from echodrift@programming.dev on 07 Dec 11:55
comments (16)
in rust@programming.dev from echodrift@programming.dev on 07 Dec 11:55
comments (16)
A user-friendly Rust driver for the Pimoroni GFX Pack with single-line initialization
(github.com)
in rust@lemmy.ml from tracyspcy@lemmy.ml on 05 Dec 21:08
comments (0)
dupe: rust@lemmy.ml (0)
in rust@lemmy.ml from tracyspcy@lemmy.ml on 05 Dec 21:08
comments (0)
dupe: rust@lemmy.ml (0)
Malicious code injection by compromised pull request branch names
(github.com)
in programming@programming.dev from Sheldan@programming.dev on 06 Dec 16:51
comments (14)
in programming@programming.dev from Sheldan@programming.dev on 06 Dec 16:51
comments (14)
Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 16:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 16:19
comments (0)
would you help me with this
in programming@programming.dev from phpinjected@lemmy.sdf.org on 03 Dec 11:33
comments (1)
in programming@programming.dev from phpinjected@lemmy.sdf.org on 03 Dec 11:33
comments (1)
EU’s first ever report on the state of cybersecurity in the Union
(www.enisa.europa.eu)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 12:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 12:23
comments (0)
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:44
comments (0)
More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:43
comments (0)
Bypassing WAFs with the phantom $Version cookie
(portswigger.net)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:42
comments (0)
Chinese Hackers Breach US Firm, Maintain Network Access for Months
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:38
comments (0)
URL File NTLM Hash Disclosure Vulnerability (0day) - and Free Micropatches for it
(blog.0patch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:36
comments (0)
China bans use of Intel, AMD and Nvidia Processor Chips for security concerns
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:34
comments (55)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:34
comments (55)
Microsoft spots another China spy crew stealing US data
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:32
comments (1)
Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:31
comments (0)
Russian programmer says FSB agents planted spyware on his Android phone
(techcrunch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Dec 11:30
comments (0)
State-Provided Software Helped Stop Cyber Attack in Texas
(www.govtech.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 06 Dec 00:17
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 06 Dec 00:17
comments (0)
Supporting the Future of Rust: Spotlight on Teaching Initiatives
(foundation.rust-lang.org)
in rust@programming.dev from BrikoX@lemmy.zip on 05 Dec 22:53
comments (0)
in rust@programming.dev from BrikoX@lemmy.zip on 05 Dec 22:53
comments (0)
Solana SDK backdoored to steal secrets, private keys
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (2)
'Earth Minotaur' Exploits WeChat, Sends Spyware to Uyghurs
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (0)
Backdoor slips into popular code library, drains ~$155k from digital wallets
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 05 Dec 16:04
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 05 Dec 16:04
comments (1)
Launching the 2024 State of Rust Survey
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 05 Dec 15:14
comments (0)
in rust@programming.dev from neme@lemm.ee on 05 Dec 15:14
comments (0)
Cisco NX-OS Flaw Let Attackers Bypass Image Signature Verification
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 13:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 13:51
comments (0)
Ukraine’s DDoS attack cripples Russia’s Gazprombank
(english.nv.ua)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:34
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:34
comments (2)
Deepfake Fraud: How AI is Bypassing Biometric Security in Financial Institutions
(www.group-ib.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:33
comments (0)
83% of organizations reported insider attacks in 2024
(securityintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:30
comments (1)