programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
anti-mass-follow-bot: Removes (blocks) mass follow bots from GitHub
(github.com)
in programming@programming.dev from mesamunefire@lemmy.world on 27 Apr 21:59
comments (1)
in programming@programming.dev from mesamunefire@lemmy.world on 27 Apr 21:59
comments (1)
I like my men
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 27 Apr 12:28
comments (15)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 27 Apr 12:28
comments (15)
Theia IDE – Open-Source Cloud and Desktop IDE
(theia-ide.org)
in programming@programming.dev from Kissaki@programming.dev on 27 Apr 08:17
comments (11)
in programming@programming.dev from Kissaki@programming.dev on 27 Apr 08:17
comments (11)
A program in C++ that transforms each pixel of a image into a sprite of correspondent color.
(bitbucket.org)
in programming@programming.dev from vitor_gabriel@lemmy.world on 26 Apr 23:51
comments (1)
in programming@programming.dev from vitor_gabriel@lemmy.world on 26 Apr 23:51
comments (1)
Devs sound alarm after Microsoft subtracts C/C++ extension from VS Code forks
(www.theregister.com)
in programming@programming.dev from neme@lemm.ee on 26 Apr 19:28
comments (87)
in programming@programming.dev from neme@lemm.ee on 26 Apr 19:28
comments (87)
O(no) You Didn’t
(mrshiny608.github.io)
in golang@programming.dev from tyler@programming.dev on 26 Apr 18:14
comments (1)
dupe: programming@programming.dev (3)
in golang@programming.dev from tyler@programming.dev on 26 Apr 18:14
comments (1)
dupe: programming@programming.dev (3)
New C++ features in GCC 15
(developers.redhat.com)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:17
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:17
comments (0)
GCC, the GNU Compiler Collection 15.1 released
(gcc.gnu.org)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:14
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:14
comments (2)
Freeing Up Gigabytes: Reclaiming Disk Space from Rust Cargo Builds
(thisdavej.com)
in rust@programming.dev from thisdavej@programming.dev on 25 Apr 01:07
comments (5)
in rust@programming.dev from thisdavej@programming.dev on 25 Apr 01:07
comments (5)
How Discord Indexes Trillions of Messages
(discord.com)
in programming@programming.dev from otter@lemmy.ca on 24 Apr 20:48
comments (1)
in programming@programming.dev from otter@lemmy.ca on 24 Apr 20:48
comments (1)
Exploiting Undefined Behavior in C/C++ Programs for Optimization: A Study on the Performance Impact (concluding that observed performance gains are minimal)
(web.ist.utl.pt)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 24 Apr 20:30
comments (1)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 24 Apr 20:30
comments (1)
Bevy 0.16
(bevyengine.org)
in rust@programming.dev from Phlimy@jlai.lu on 24 Apr 20:20
comments (2)
in rust@programming.dev from Phlimy@jlai.lu on 24 Apr 20:20
comments (2)
Regarding ! coding_enthusiasts@lemmy.zip
in programming@programming.dev from Linux@lemmy.zip on 24 Apr 20:12
comments (3)
in programming@programming.dev from Linux@lemmy.zip on 24 Apr 20:12
comments (3)
Trojanized Alpine Quest app geolocates Russian soldiers
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Apr 08:11
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Apr 08:11
comments (0)
ASUS releases fix for AMI bug that lets hackers brick servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Apr 23:54
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Apr 23:54
comments (0)
Uma nova skill, ainda tem muito chão pra percorrer e caminhos a trilhar, mas hoje conquistei uma nova badge para minha coleção. Primeiros passos em mais uma ferramenta para meu #ToolBelt
in golang@programming.dev from riverfount@bolha.us on 23 Apr 23:50
comments (0)
in golang@programming.dev from riverfount@bolha.us on 23 Apr 23:50
comments (0)
AI: a fork in the road for open source
(octet-stream.net)
in programming@programming.dev from thomask@lemmy.sdf.org on 23 Apr 11:41
comments (10)
in programming@programming.dev from thomask@lemmy.sdf.org on 23 Apr 11:41
comments (10)
i want to learn/use functional programming language
in programming@programming.dev from occultist8128@infosec.pub on 23 Apr 06:58
comments (20)
in programming@programming.dev from occultist8128@infosec.pub on 23 Apr 06:58
comments (20)
JetBrains sunsets another product citing lower than expected adoption rates
(www.neowin.net)
in programming@programming.dev from cm0002@lemmy.world on 23 Apr 02:40
comments (6)
in programming@programming.dev from cm0002@lemmy.world on 23 Apr 02:40
comments (6)
Ripple’s recommended XRP library xrpl.js hacked to steal wallets
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 18:36
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 18:36
comments (1)
Git without a forge
(www.chiark.greenend.org.uk)
in programming@programming.dev from maxint@programming.dev on 22 Apr 15:13
comments (55)
in programming@programming.dev from maxint@programming.dev on 22 Apr 15:13
comments (55)
GitHub - maurymarkowitz/101-BASIC-Computer-Games: Type-in programs from the original 101 BASIC Computer Games, in their original DEC and Dartmouth dialects.
(github.com)
in programming@programming.dev from mesamunefire@lemmy.world on 22 Apr 03:26
comments (1)
in programming@programming.dev from mesamunefire@lemmy.world on 22 Apr 03:26
comments (1)
Texas city takes systems offline after cyberattack
(therecord.media)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 22 Apr 02:52
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 22 Apr 02:52
comments (1)
Bug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 steps
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 02:48
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 02:48
comments (2)
Microsoft rated this bug as low exploitability. Miscreants weaponized it in just 8 days
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 01:42
comments (8)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 01:42
comments (8)
Cheating the Reaper in Go
(mcyoung.xyz)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 21 Apr 23:49
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 21 Apr 23:49
comments (0)
Codeberg, self-hosting Gitea, or something else?
in programming@programming.dev from scheep@lemmy.world on 21 Apr 23:39
comments (19)
in programming@programming.dev from scheep@lemmy.world on 21 Apr 23:39
comments (19)
Software's Inner Platform Effect, or, Why you Might Be Hurting Yourself
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 21 Apr 19:31
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 21 Apr 19:31
comments (0)
Software Development Has Too Much Software In It
(smustafa.blog)
in programming@programming.dev from cosmicboi@programming.dev on 21 Apr 18:39
comments (3)
in programming@programming.dev from cosmicboi@programming.dev on 21 Apr 18:39
comments (3)
Getting Forked by Microsoft
(philiplaine.com)
in programming@programming.dev from boramalper@lemmy.world on 21 Apr 14:14
comments (20)
in programming@programming.dev from boramalper@lemmy.world on 21 Apr 14:14
comments (20)
crc32sum - Print CRC-32 (binary mode) checksums with Python on Linux.
(github.com)
in programming@programming.dev from thingsiplay@beehaw.org on 21 Apr 11:18
comments (6)
in programming@programming.dev from thingsiplay@beehaw.org on 21 Apr 11:18
comments (6)
The Hippocratic License 3.0: An Ethical License for Open Source.
(firstdonoharm.dev)
in programming@programming.dev from tad_lispy@lemm.ee on 21 Apr 05:29
comments (28)
in programming@programming.dev from tad_lispy@lemm.ee on 21 Apr 05:29
comments (28)
Notes about "go: RLock go.mod: no locks available" and similar errors
in golang@programming.dev from e0qdk@reddthat.com on 21 Apr 03:05
comments (5)
in golang@programming.dev from e0qdk@reddthat.com on 21 Apr 03:05
comments (5)
The Web is Broken
(jan.wildeboer.net)
in cybersecurity@sh.itjust.works from Ninjazzon@infosec.pub on 20 Apr 05:38
comments (0)
in cybersecurity@sh.itjust.works from Ninjazzon@infosec.pub on 20 Apr 05:38
comments (0)
Vibe Coding is not an excuse for low-quality work
(addyo.substack.com)
in programming@programming.dev from mesamunefire@lemmy.world on 19 Apr 21:33
comments (46)
in programming@programming.dev from mesamunefire@lemmy.world on 19 Apr 21:33
comments (46)
Kellnr has a new UI
in rust@programming.dev from secana@programming.dev on 19 Apr 16:26
comments (3)
in rust@programming.dev from secana@programming.dev on 19 Apr 16:26
comments (3)
AceCode.social - Code Editor and programmable page objects
(makertube.net)
in programming@programming.dev from blue_berry@lemmy.world on 19 Apr 16:21
comments (0)
in programming@programming.dev from blue_berry@lemmy.world on 19 Apr 16:21
comments (0)
How I Got Hacked: A Warning about Malicious PoCs
(chocapikk.com)
in cybersecurity@sh.itjust.works from ByteOnBikes@slrpnk.net on 18 Apr 13:31
comments (2)
in cybersecurity@sh.itjust.works from ByteOnBikes@slrpnk.net on 18 Apr 13:31
comments (2)
EUVD: Vulnerability Database operated by ENISA (beta)
(euvd.enisa.europa.eu)
in cybersecurity@sh.itjust.works from vf2000@lemmy.zip on 18 Apr 07:40
comments (2)
in cybersecurity@sh.itjust.works from vf2000@lemmy.zip on 18 Apr 07:40
comments (2)
Marching Events: What does iCalendar have to do with ray marching?
(pwy.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 18 Apr 05:31
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 18 Apr 05:31
comments (0)
Angry Chickens 2 - Easter slingshot game (JavaScript tutorial)
(slicker.me)
in programming@programming.dev from monica_b1998@lemmy.world on 18 Apr 04:08
comments (1)
in programming@programming.dev from monica_b1998@lemmy.world on 18 Apr 04:08
comments (1)
Insecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techs
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 17 Apr 20:32
comments (0)
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 17 Apr 20:32
comments (0)
Making Software
(www.makingsoftware.com)
in programming@programming.dev from who@feddit.org on 17 Apr 18:24
comments (1)
in programming@programming.dev from who@feddit.org on 17 Apr 18:24
comments (1)
Multiple Groups Exploit NTLM Flaw in Microsoft Windows
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:06
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:06
comments (1)
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:05
comments (0)
CrazyHunter Campaign Targets Taiwanese Critical Sectors
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
New macOS Spyware PasivRobber Linked to Chinese State Actors
(cyberinsider.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:03
comments (0)
Over 16,000 Fortinet devices compromised with symlink backdoor
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:02
comments (0)
CISA warns of potential data breaches caused by legacy Oracle Cloud leak
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:00
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:00
comments (1)
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (0)
Huge ransomware campaign targets AWS S3 storage: attackers have thousands of keys
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (1)
Functional JSX-Syntax for Webcomponents.
(positive-intentions.com)
in programming@programming.dev from xoron@programming.dev on 17 Apr 12:53
comments (5)
in programming@programming.dev from xoron@programming.dev on 17 Apr 12:53
comments (5)
Vulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your location
(www.youtube.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 20:02
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 20:02
comments (0)
GCVE: Global CVE Allocation System
(gcve.eu)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 18:57
comments (2)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 18:57
comments (2)
CVE program gets a last-minute save, maybe a new home
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 16 Apr 17:16
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 16 Apr 17:16
comments (1)
Cutting Down Rust Compile Times From 30 to 2 Minutes With One Thousand Crates
(www.feldera.com)
in rust@programming.dev from ruffsl@programming.dev on 16 Apr 15:53
comments (9)
in rust@programming.dev from ruffsl@programming.dev on 16 Apr 15:53
comments (9)
C++ creator Bjarne Stroustrup reimagines how coding is taught
(stanforddaily.com)
in programming@programming.dev from cm0002@lemmy.world on 16 Apr 15:45
comments (4)
in programming@programming.dev from cm0002@lemmy.world on 16 Apr 15:45
comments (4)
Renewed Russian Phishing Campaign Against European Diplomats
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 16 Apr 14:36
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 16 Apr 14:36
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
UK Software Firm Exposed 1.1TB of Healthcare Worker Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:21
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:21
comments (0)
Windows 11 Escalation Vulnerability Let Attackers Gain Admin Access Within 300 Milliseconds
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (8)
Oracle Security Update - Patch for 378 Vulnerabilities Including Remote Exploits
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (1)
Cybersecurity World On Edge As CVE Program Prepares To Go Dark
(flip.it)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 06:28
comments (4)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 06:28
comments (4)
Notorious internet messageboard 4chan has been hacked, posts claim
(www.reuters.com)
in cybersecurity@sh.itjust.works from Jiggle_Physics@sh.itjust.works on 16 Apr 04:08
comments (3)
in cybersecurity@sh.itjust.works from Jiggle_Physics@sh.itjust.works on 16 Apr 04:08
comments (3)
The case of the UI thread that hung in a kernel call
(devblogs.microsoft.com)
in programming@programming.dev from chaospatterns@lemmy.world on 16 Apr 02:58
comments (0)
in programming@programming.dev from chaospatterns@lemmy.world on 16 Apr 02:58
comments (0)
US abruptly turns off funding for CVE program
(www.theregister.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 02:29
comments (28)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 02:29
comments (28)
The CVE program for tracking security flaws is about to lose federal funding
(www.theverge.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 15 Apr 20:49
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 15 Apr 20:49
comments (6)
Threat actors misuse Node.js to deliver malware and other malicious payloads
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Apr 20:45
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Apr 20:45
comments (0)
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:14
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:14
comments (2)
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:13
comments (0)
Google adds Android auto-reboot to block forensic data extractions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:30
comments (0)
Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
Possible Russian Hackers Targeted UK Ministry of Defense
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
Hackers Leveraging Teams Messages to Execute Malware on Windows Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (1)
New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
Over 100,000 WordPress Plugin VUlnerability Exploited Just 4 Hours After Disclosure
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:23
comments (0)
Hertz data breach: Customers in US, EU, UK, Australia and Canada affected - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:22
comments (0)
Any suggestions for a self-hosted CI that can also be run locally?
in programming@programming.dev from onlinepersona@programming.dev on 15 Apr 13:26
comments (39)
in programming@programming.dev from onlinepersona@programming.dev on 15 Apr 13:26
comments (39)
4Chan hacked
(www.the-sun.com)
in cybersecurity@sh.itjust.works from Picasso@sh.itjust.works on 15 Apr 13:04
comments (5)
in cybersecurity@sh.itjust.works from Picasso@sh.itjust.works on 15 Apr 13:04
comments (5)
The Rise of Slopsquatting: How AI Hallucinations Are Fueling a New Class of Supply Chain Attacks
(socket.dev)
in programming@programming.dev from baatliwala@lemmy.world on 15 Apr 04:32
comments (1)
in programming@programming.dev from baatliwala@lemmy.world on 15 Apr 04:32
comments (1)
Introducing OnlyNv: Your one-stop solution for managing environment variables.
(onlynv.dev)
in programming@programming.dev from TheCommieAxolotl@programming.dev on 15 Apr 02:48
comments (10)
in programming@programming.dev from TheCommieAxolotl@programming.dev on 15 Apr 02:48
comments (10)
Rust GUI survey 2025
(www.boringcactus.com)
in rust@programming.dev from SufferingSteve@feddit.nu on 14 Apr 22:36
comments (26)
in rust@programming.dev from SufferingSteve@feddit.nu on 14 Apr 22:36
comments (26)
Putz travei nos estudos de simplesmente não está funcionando, mas tb não dá erro ahahah responde qq endpoint da minha API com o mesmo, mesmo que seja um endpoint que não existe ele retorna
in golang@programming.dev from riverfount@bolha.us on 14 Apr 16:42
comments (1)
in golang@programming.dev from riverfount@bolha.us on 14 Apr 16:42
comments (1)
South African telecom provider Cell C disclosed a data breach
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:22
comments (0)
SSL Certificate Validity Reduced to 47 Days After Apple Proposal
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (10)
Chrome 136 fixes 20-year browser history privacy risk
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (2)
Data Breach at Planned Parenthood Lab Partner Exposes Info of 1.6M
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:20
comments (0)
China Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
TROX Stealer: A deep dive into a new Malware as a Service (MaaS) attack campaign
(sublime.security)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
GoPhish Infrastructure Targets Polish Energy and Government
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:46
comments (0)
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
Russia’s Storm-2372 Hits Orgs with MFA Bypass via Device Code Phishing
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
Wolters Kluwer allegedly hit by data breach, threatening Fortune 500 firms
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
Mistakes and cool things to do with arena allocators
(zylinski.se)
in programming@programming.dev from maxint@programming.dev on 14 Apr 10:13
comments (2)
in programming@programming.dev from maxint@programming.dev on 14 Apr 10:13
comments (2)
Of Kind Chess and Wicked Programming: How AI Influences Our Creativity
(amenji.io)
in programming@programming.dev from amenji@programming.dev on 14 Apr 05:08
comments (2)
in programming@programming.dev from amenji@programming.dev on 14 Apr 05:08
comments (2)
Anubis works (anti ai crawler software)
(xeiaso.net)
in programming@programming.dev from mesamunefire@lemmy.world on 13 Apr 01:09
comments (16)
in programming@programming.dev from mesamunefire@lemmy.world on 13 Apr 01:09
comments (16)
AI-hallucinated code dependencies become new supply chain risk
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:55
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:55
comments (3)
Microsoft: Windows 'inetpub' folder created by security fix, don’t delete
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:50
comments (22)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:50
comments (22)
Microsoft Defender will isolate undiscovered endpoints to block attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:48
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:48
comments (0)
Star-TeX v0.7.1 is out
(pkg.go.dev)
in golang@programming.dev from cm0002@lemmy.world on 12 Apr 17:15
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 12 Apr 17:15
comments (0)
Learning React - Need resources
in programming@programming.dev from Kelho@lemmy.ml on 12 Apr 15:28
comments (10)
in programming@programming.dev from Kelho@lemmy.ml on 12 Apr 15:28
comments (10)
crates.io security incident: improperly stored session cookies
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 12 Apr 15:10
comments (5)
in rust@programming.dev from neme@lemm.ee on 12 Apr 15:10
comments (5)
Elliptical Python Programming
(susam.net)
in programming@programming.dev from maxint@programming.dev on 12 Apr 14:52
comments (2)
in programming@programming.dev from maxint@programming.dev on 12 Apr 14:52
comments (2)
Programming book recommendations?
in programming@programming.dev from andioop@programming.dev on 12 Apr 14:40
comments (27)
in programming@programming.dev from andioop@programming.dev on 12 Apr 14:40
comments (27)
AI isn’t ready to replace human coders for debugging, researchers say
(arstechnica.com)
in programming@programming.dev from neme@lemm.ee on 12 Apr 12:35
comments (32)
in programming@programming.dev from neme@lemm.ee on 12 Apr 12:35
comments (32)
Release: deku_string 0.1.0
in rust@programming.dev from blazebra@programming.dev on 11 Apr 17:44
comments (0)
in rust@programming.dev from blazebra@programming.dev on 11 Apr 17:44
comments (0)
Initial Access Brokers Shift Tactics, Selling More for Less
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:33
comments (0)
CVE-2025-29824 Vulnerability: Exploitation of a Windows CLFS Zero-Day Could Trigger Ransomware Attacks - SOC Prime
(socprime.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (0)
U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (4)
Sensata Technologies Breached: Ransomware Attack Key Systems
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
Jenkins Docker Images Vulnerable to SSH Host Key Reuse
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
Experiences using leptos or yew in production (or giving up trying)?
in rust@programming.dev from Sibbo@sopuli.xyz on 11 Apr 13:27
comments (5)
in rust@programming.dev from Sibbo@sopuli.xyz on 11 Apr 13:27
comments (5)
Ransomware attack cost IKEA operator in Eastern Europe $23 million
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
Ransomware groups push negotiations to new levels of uncertainty - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
dupe: cybersecurity@sh.itjust.works (0)
Hackers exploit WordPress plugin auth bypass hours after disclosure
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
FortiSwitch vulnerability may give attackers control over vulnerable devices (CVE-2024-48887) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
Newly Registered Domains Distributing SpyNote Malware - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
Resecurity | Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach
(www.resecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
(www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (0)
Phishing kits now vet victims in real-time before stealing credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (1)
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 12:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 12:37
comments (0)
Linus Torvalds built Git in 10 days - and never imagined it would last 20 years
(www.zdnet.com)
in programming@programming.dev from cm0002@lemmy.world on 11 Apr 06:17
comments (70)
in programming@programming.dev from cm0002@lemmy.world on 11 Apr 06:17
comments (70)
How to Build a React Page Builder: Puck and Tailwind v4.0
in programming@programming.dev from fedeboto@programming.dev on 11 Apr 02:39
comments (1)
in programming@programming.dev from fedeboto@programming.dev on 11 Apr 02:39
comments (1)
China-based SMS Phishing Triad Pivots to Banks
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Apr 02:21
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Apr 02:21
comments (0)
6 usability improvements in GCC 15
(developers.redhat.com)
in programming@programming.dev from cm0002@lemmy.world on 10 Apr 20:50
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 10 Apr 20:50
comments (0)
Oracle Appears to Admit Breach of 2 'Obsolete' Servers
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:55
comments (0)
Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:54
comments (0)
Two decades of Git: A conversation with creator Linus Torvalds
(www.youtube.com)
in programming@programming.dev from SandroHc@lemmy.world on 10 Apr 11:48
comments (1)
in programming@programming.dev from SandroHc@lemmy.world on 10 Apr 11:48
comments (1)
Google fixes two actively exploited zero-day vulnerabilities in Android
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:48
comments (1)
CISA Warns of CentreStack's Hard-Coded MachineKey Vulnerability Enabling RCE Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:47
comments (0)
Hackers Claim Magento Breach via Third-Party, Leak CRM Data of 700K Users
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
Hacker Claims WooCommerce Data Breach, Selling 4m User Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
17,000,000 GrubHub passwords and other data exposed, hackers claim
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (8)
Ransomware Attacks Hit All-Time High as Payoffs Dwindle
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 20:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 20:38
comments (0)
How we ended up rewriting NuGet Restore in .NET 9 - .NET Blog
(devblogs.microsoft.com)
in programming@programming.dev from Kissaki@programming.dev on 09 Apr 19:41
comments (0)
in programming@programming.dev from Kissaki@programming.dev on 09 Apr 19:41
comments (0)
March Project Goals Update
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 09 Apr 14:53
comments (0)
in rust@programming.dev from neme@lemm.ee on 09 Apr 14:53
comments (0)
Microsoft April 2025 Patch Tuesday - SANS Internet Storm Center
(isc.sans.edu)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
WhatsApp flaw can let attackers run malicious code on Windows PCs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
Fastly DDoS Attack Insights helps reveal and explain the unfolding of a DDoS attack - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:46
comments (0)
Hackers lurked in Treasury OCC’s systems since June 2023 breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
300K vehicles and millions of trips exposed in fleet manager’s data leak
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
New Mirai botnet behind surge in TVT DVR exploitation
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:36
comments (0)
Pharmacist accused of spying on women using work, home cams
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 09 Apr 03:23
comments (3)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 09 Apr 03:23
comments (3)
Better VSCode customizations?
in programming@programming.dev from shortrounddev@lemmy.world on 08 Apr 18:26
comments (5)
in programming@programming.dev from shortrounddev@lemmy.world on 08 Apr 18:26
comments (5)
rustc_codegen_gcc: Progress Report #35
(blog.antoyo.xyz)
in rust@programming.dev from antoyo@programming.dev on 08 Apr 18:24
comments (11)
in rust@programming.dev from antoyo@programming.dev on 08 Apr 18:24
comments (11)
Git turns 20: A Q&A with Linus Torvalds - The GitHub Blog
(github.blog)
in programming@programming.dev from Kissaki@programming.dev on 08 Apr 16:10
comments (13)
in programming@programming.dev from Kissaki@programming.dev on 08 Apr 16:10
comments (13)
Food giant WK Kellogg discloses data breach linked to Clop ransomware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:53
comments (0)
ToddyCat APT Targets ESET Bug to Load Silent Malware
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:52
comments (0)
Cybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platforms
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:50
comments (0)
Google fixes Android zero-days exploited in attacks, 60 other flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (1)
Everest ransomware's dark web leak site defaced, now offline
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (0)
CISA braces for more cuts, threat-intel efforts are doomed
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 02:12
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 02:12
comments (0)
Oracle tells customers its public cloud was compromised
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 01:21
comments (3)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 01:21
comments (3)
Malicious VSCode extensions infect Windows with cryptominers
(www.bleepingcomputer.com)
in programming@programming.dev from drspod@lemmy.ml on 07 Apr 17:58
comments (31)
dupe: cybersecurity@sh.itjust.works (2)
in programming@programming.dev from drspod@lemmy.ml on 07 Apr 17:58
comments (31)
dupe: cybersecurity@sh.itjust.works (2)
How curl developers write safe(r) code in C
(www.youtube.com)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 07 Apr 16:12
comments (0)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 07 Apr 16:12
comments (0)
[Question] How to build from ground up solar led/optic fiber lightning? [Hardware][Electronics][Coding]
in programming@programming.dev from N0x0n@lemmy.ml on 07 Apr 15:08
comments (0)
in programming@programming.dev from N0x0n@lemmy.ml on 07 Apr 15:08
comments (0)
E-ZPass toll payment texts return in massive phishing wave
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:30
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:30
comments (2)
Python JSON Logger Vulnerability Enables Remote Code Execution - PoC Released
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (0)
New Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoader
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (1)
How ToddyCat tried to hide behind AV software.
(securelist.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 07 Apr 14:25
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 07 Apr 14:25
comments (0)
WinRAR security flaw ignores Windows Mark of the Web security warnings
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 07 Apr 05:21
comments (20)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 07 Apr 05:21
comments (20)
Orsom Peters: Bitwise Binary Search: Elegant and Fast
(orlp.net)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 06 Apr 09:28
comments (2)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 06 Apr 09:28
comments (2)
What SDLC Paradigm Did You Use in Your Project?
in programming@programming.dev from Cheezyburger@programming.dev on 06 Apr 02:54
comments (13)
in programming@programming.dev from Cheezyburger@programming.dev on 06 Apr 02:54
comments (13)
Why OAuth MUST share access token with 3rd party?!?
in cybersecurity@sh.itjust.works from maltfield@monero.town on 06 Apr 00:56
comments (16)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 06 Apr 00:56
comments (16)
The official Rust project account will no longer be active on X
in rust@programming.dev from neme@lemm.ee on 05 Apr 19:32
comments (84)
in rust@programming.dev from neme@lemm.ee on 05 Apr 19:32
comments (84)
Cyberattacks by AI agents are coming
(www.technologyreview.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 05 Apr 16:35
comments (9)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 05 Apr 16:35
comments (9)
Can I make a forum website with Ruby on Rails?
in programming@programming.dev from aras@lemm.ee on 05 Apr 08:52
comments (12)
in programming@programming.dev from aras@lemm.ee on 05 Apr 08:52
comments (12)
Modernizing push notification API for Teams - .NET Blog
(devblogs.microsoft.com)
in programming@programming.dev from Kissaki@programming.dev on 05 Apr 06:42
comments (0)
in programming@programming.dev from Kissaki@programming.dev on 05 Apr 06:42
comments (0)
Help us create a vision for Rust's future
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 04 Apr 18:53
comments (0)
in rust@programming.dev from neme@lemm.ee on 04 Apr 18:53
comments (0)
C ABI Changes for `wasm32-unknown-unknown`
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 04 Apr 18:52
comments (0)
in rust@programming.dev from neme@lemm.ee on 04 Apr 18:52
comments (0)
Port of Seattle says ransomware breach impacts 90,000 people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 18:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 18:49
comments (0)
PoisonSeed Campaign Targets CRM and Bulk Email Providers in Supply Chain Spam Operation
(www.silentpush.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 18:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 18:48
comments (0)
Malicious VPN Extensions on Chrome Web Store Infect 139,000 Users
(cyberinsider.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 04 Apr 18:40
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 04 Apr 18:40
comments (0)
RolandSkimmer: Silent Credit Card Thief Uncovered | FortiGuard Labs
(www.fortinet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 11:44
comments (0)
Hackers strike Australia's largest pension funds in coordinated attacks
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 11:43
comments (0)
Whats the difference between Neonephos and Eurostack?
in programming@programming.dev from onlinepersona@programming.dev on 04 Apr 09:41
comments (2)
in programming@programming.dev from onlinepersona@programming.dev on 04 Apr 09:41
comments (2)
Simplifying JWT Validation for Developers
in cybersecurity@sh.itjust.works from andyssojet@sh.itjust.works on 04 Apr 09:31
comments (1)
in cybersecurity@sh.itjust.works from andyssojet@sh.itjust.works on 04 Apr 09:31
comments (1)
New approach.
in cybersecurity@sh.itjust.works from opalfrost@friendica.world on 03 Apr 15:40
comments (0)
in cybersecurity@sh.itjust.works from opalfrost@friendica.world on 03 Apr 15:40
comments (0)
Apple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)
(arstechnica.com)
in cybersecurity@sh.itjust.works from onlinepersona@programming.dev on 04 Apr 07:10
comments (1)
in cybersecurity@sh.itjust.works from onlinepersona@programming.dev on 04 Apr 07:10
comments (1)
Datastructure for intervals across 64-bits or 128-bits??
in programming@programming.dev from dragontamer@lemmy.world on 04 Apr 01:32
comments (5)
in programming@programming.dev from dragontamer@lemmy.world on 04 Apr 01:32
comments (5)
More predictable benchmarking with testing.B.Loop
(go.dev)
in golang@programming.dev from neme@lemm.ee on 04 Apr 01:16
comments (0)
in golang@programming.dev from neme@lemm.ee on 04 Apr 01:16
comments (0)
New rust release 1.86.0
(releases.rs)
in rust@lemmy.ml from Zenlix@lemm.ee on 03 Apr 10:50
comments (0)
in rust@lemmy.ml from Zenlix@lemm.ee on 03 Apr 10:50
comments (0)
Suspected Chinese snoops hijacking buggy Ivanti gear — again
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 03 Apr 20:02
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 03 Apr 20:02
comments (0)
Hacker Claims Twilio's SendGrid Data Breach, Selling 848,000 Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Apr 19:18
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Apr 19:18
comments (2)