programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 13:01
comments (0)
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:57
comments (0)
Prometei Botnet Activity Spikes - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:50
comments (0)
PoC Released for Notepad++ Flaw Enables Privilege Escalation to NT AUTHORITY\SYSTEM
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:40
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:40
comments (1)
Russian court releases several REvil ransomware gang members | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:34
comments (0)
Canada says Salt Typhoon hacked telecom firm via Cisco flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:26
comments (0)
Critical Key Derivation Flaws in pbkdf2 Affect Millions of JavaScript Projects, PoC Available
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:19
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:19
comments (3)
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:10
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:10
comments (1)
The Biggest Chinese Data Leak "Ever"
(spycloud.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 12:01
comments (0)
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:58
comments (0)
Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:49
comments (0)
Critical Authentication Bypass Flaw Patched in Teleport - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:40
comments (0)
Steel giant Nucor confirms hackers stole data in recent breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:34
comments (0)
Data of more than 740,000 stolen in ransomware attack on Michigan hospital network | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:25
comments (0)
US Warns of Heightened Risk of Iranian Cyber-Attacks After Military St - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:16
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 11:16
comments (2)
China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19
(www.article19.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 11:10
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 11:10
comments (0)
The Guardian and Cambridge University's Department of Computer Science unveil new secure technology to protect sources
(www.theguardian.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 24 Jun 10:39
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 24 Jun 10:39
comments (0)
Made a way to share links privately
(qrc.site)
in programming@programming.dev from RommieDroid@programming.dev on 24 Jun 09:36
comments (2)
in programming@programming.dev from RommieDroid@programming.dev on 24 Jun 09:36
comments (2)
China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devices
(securityscorecard.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 04:58
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Jun 04:58
comments (0)
Grab, the leading superapp in Southeast Asia, recently rewrote its "Counter Service" using Rust, achieving significant efficiency gains and proving the language's power for high-performance
(engineering.grab.com)
in rust@lemmy.ml from vi21@lemmy.ml on 23 Jun 15:04
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from vi21@lemmy.ml on 23 Jun 15:04
comments (0)
dupe: rust@programming.dev (0)
Typhoon-like gang slinging TLS certificate 'signed' by LAPD
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Jun 00:58
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Jun 00:58
comments (1)
Canadian telecom hacked by suspected China state group
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jun 23:11
comments (5)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jun 23:11
comments (5)
Aflac says it stopped attack launched by ‘sophisticated cybercrime group’ | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:40
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:40
comments (2)
Anubis Ransomware Lists Disneyland Paris as New Victim
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:34
comments (0)
Cloudflare Tunnels Abused in New Malware Campaign - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:25
comments (0)
CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin - Security Boulevard
(securityboulevard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:16
comments (0)
Ransomware Gangs Collapse as Qilin Seizes Control
(www.cybereason.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:08
comments (0)
Russian hackers bypass Gmail MFA using stolen app passwords
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:02
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 22:02
comments (2)
Oxford City Council suffers breach exposing two decades of data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:58
comments (0)
Hackers Post Dozens of Malicious Copycat Repos to GitHub
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:49
comments (0)
Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 21:43
comments (0)
WhatsApp messaging app banned on all US House of Representatives devices
(www.theguardian.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Jun 17:29
comments (4)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Jun 17:29
comments (4)
How could I allow users to schedule sending emails at a specific interval?
in programming@programming.dev from lena@gregtech.eu on 23 Jun 15:42
comments (1)
in programming@programming.dev from lena@gregtech.eu on 23 Jun 15:42
comments (1)
How could I allow users to schedule sending emails at a specific interval?
in golang@programming.dev from lena@gregtech.eu on 23 Jun 15:41
comments (14)
in golang@programming.dev from lena@gregtech.eu on 23 Jun 15:41
comments (14)
Canada says Chinese-backed hackers were likely behind recent malicious activity targeting domestic telecommunications infrastructure
(www.insurancejournal.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 23 Jun 15:33
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 23 Jun 15:33
comments (0)
Massive 170K database filled to the brim with plaintext PII exposed
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 11:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jun 11:13
comments (0)
Does the digital security equilibrium hold under AI?
(www.bsg.ox.ac.uk)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Jun 10:19
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Jun 10:19
comments (0)
How fast are Linux pipes anyway?
(mazzo.li)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 22 Jun 18:06
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 22 Jun 18:06
comments (0)
Announcing the Clippy feature freeze
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 22 Jun 18:01
comments (0)
in rust@programming.dev from neme@lemm.ee on 22 Jun 18:01
comments (0)
Disinformation for beginners: How access to TikTok is threatening European security
(ecfr.eu)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 Jun 17:03
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 Jun 17:03
comments (0)
Finding the right balance between DDD, Clean and Hexagonal architectures
(dev.to)
in programming@programming.dev from pylapp@programming.dev on 22 Jun 15:11
comments (0)
in programming@programming.dev from pylapp@programming.dev on 22 Jun 15:11
comments (0)
Writing Toy Software Is A Joy
(www.jsbarretto.com)
in programming@programming.dev from learnbyexample@programming.dev on 22 Jun 11:50
comments (5)
in programming@programming.dev from learnbyexample@programming.dev on 22 Jun 11:50
comments (5)
Revisiting Knuth's 'Premature Optimization' Paper
(probablydance.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 22 Jun 06:23
comments (13)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 22 Jun 06:23
comments (13)
AI Models from Google, OpenAI, Anthropic Solve 0% of ‘Hard’ Coding Problems
(analyticsindiamag.com)
in programming@programming.dev from cm0002@lemmy.world on 22 Jun 05:59
comments (83)
in programming@programming.dev from cm0002@lemmy.world on 22 Jun 05:59
comments (83)
Cyber Security Card Game
in cybersecurity@sh.itjust.works from LockheedTheDragon@lemmy.world on 21 Jun 20:13
comments (7)
in cybersecurity@sh.itjust.works from LockheedTheDragon@lemmy.world on 21 Jun 20:13
comments (7)
If Your Kernel Development Is A Little Rusty
(hackaday.com)
in rust@programming.dev from cm0002@lemmy.world on 21 Jun 17:57
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 21 Jun 17:57
comments (0)
Hare 0.25.2 released
(harelang.org)
in programming@programming.dev from rwnobrega@lemmy.world on 21 Jun 12:18
comments (0)
in programming@programming.dev from rwnobrega@lemmy.world on 21 Jun 12:18
comments (0)
JavaScript broke the web (and called it progress)
(www.jonoalderson.com)
in programming@programming.dev from pylapp@programming.dev on 21 Jun 08:17
comments (58)
in programming@programming.dev from pylapp@programming.dev on 21 Jun 08:17
comments (58)
Entangled: Literate Programming in Markdown
(entangled.github.io)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 21 Jun 05:34
comments (1)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 21 Jun 05:34
comments (1)
Github has started charging me on the free tier?
in programming@programming.dev from mesamunefire@piefed.social on 20 Jun 18:33
comments (28)
in programming@programming.dev from mesamunefire@piefed.social on 20 Jun 18:33
comments (28)
Banana Squad’s Stealthy GitHub Malware Campaign Targets Devs - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:50
comments (0)
Godfather Android malware now uses virtualization to hijack banking apps
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:40
comments (0)
UBS Employee Data Reportedly Exposed in Third Party Attack - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:34
comments (0)
Krispy Kreme says November data breach impacts over 160,000 people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:26
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:26
comments (4)
UK Passes Data Use and Access Regulation Bill
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 12:16
comments (1)
The Hidden Threat: How DanaBot Malware Facilitated Data Theft and Russian State-Sponsored Spying
(www.rferl.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Jun 04:59
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Jun 04:59
comments (0)
No, the 16 billion credentials leak is not a new data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 00:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jun 00:26
comments (0)
pasejo: CLI password manager using age
(github.com)
in rust@lemmy.ml from seb@lemmy.ml on 19 Jun 16:54
comments (0)
in rust@lemmy.ml from seb@lemmy.ml on 19 Jun 16:54
comments (0)
The ultimate Rust performance guide
(www.youtube.com)
in rust@programming.dev from clot27@lemmy.zip on 19 Jun 14:59
comments (4)
in rust@programming.dev from clot27@lemmy.zip on 19 Jun 14:59
comments (4)
Literature review on the benefits of static types, by Dan Luu
(danluu.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 19 Jun 11:59
comments (84)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 19 Jun 11:59
comments (84)
Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
[Solved] Python question: How to convert list to sort with multiple keys?
in programming@programming.dev from thingsiplay@beehaw.org on 19 Jun 07:51
comments (4)
in programming@programming.dev from thingsiplay@beehaw.org on 19 Jun 07:51
comments (4)
analogatique · web gallery for your photos
(github.com)
in rust@lemmy.ml from un1970ix@lemmy.ml on 18 Jun 12:13
comments (0)
in rust@lemmy.ml from un1970ix@lemmy.ml on 18 Jun 12:13
comments (0)
Rust compiler performance survey 2025
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 18 Jun 20:05
comments (0)
in rust@programming.dev from neme@lemm.ee on 18 Jun 20:05
comments (0)
Critical Vulnerability Patched in Citrix NetScaler
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 15:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 15:02
comments (0)
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 14:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 14:51
comments (0)
Telegram Messenger's Ties to Russia's FSB Revealed in New Report - Newsweek
(www.newsweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:32
comments (12)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:32
comments (12)
BeyondTrust warns of pre-auth RCE in Remote Support software
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:26
comments (0)
New Linux udisks flaw lets attackers get root on major Linux distros
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:18
comments (0)
Python Protobuf Flaw Allows DoS Via Nested Messages
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:08
comments (0)
RapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devices
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:01
comments (0)
WormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Models
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:59
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:59
comments (5)
Taiwan Targeted In Sophisticated Malware Campaign Disguised As Tax Emails
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:50
comments (0)
Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number | Malwarebytes
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:42
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:42
comments (7)
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:34
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:34
comments (2)
Scania confirms insurance claim data breach in extortion attempt
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:11
comments (0)
Zyxel Firewall Vulnerability Again in Attacker Crosshairs
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 11:54
comments (0)
A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator
(intel471.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 18 Jun 08:06
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 18 Jun 08:06
comments (0)
Working on databases from prison: How I got here, part 2.
(turso.tech)
in programming@programming.dev from bytesonbike@discuss.online on 17 Jun 23:27
comments (7)
in programming@programming.dev from bytesonbike@discuss.online on 17 Jun 23:27
comments (7)
Ratatui - a Rust library for cooking up delicious TUIs
(ratatui.rs)
in rust@programming.dev from cm0002@lemmy.world on 17 Jun 21:40
comments (3)
in rust@programming.dev from cm0002@lemmy.world on 17 Jun 21:40
comments (3)
phkmalloc
(phk.freebsd.dk)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Jun 21:08
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Jun 21:08
comments (0)
jemalloc Postmortem
(jasone.github.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Jun 21:07
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Jun 21:07
comments (0)
New Veeam RCE flaw lets domain users hack backup servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:40
comments (0)
Hacker steals 1 million Cock.li user records in webmail data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:32
comments (0)
U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:26
comments (0)
Two Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and money
(www.lighthousereports.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 17 Jun 14:12
comments (6)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 17 Jun 14:12
comments (6)
Biome v2 launched: First type-aware linter that doesn't require tsc
(biomejs.dev)
in programming@programming.dev from arendjr@programming.dev on 17 Jun 14:06
comments (4)
in programming@programming.dev from arendjr@programming.dev on 17 Jun 14:06
comments (4)
New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 14:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 14:00
comments (0)
Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:56
comments (0)
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:49
comments (0)
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:26
comments (0)
Kali Linux 2025.2 released with 13 new tools, car hacking updates
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:16
comments (0)
Washington Post Staffer Emails Targeted in Cyber Breach
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:10
comments (0)
Hackers switch to targeting U.S. insurance companies
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:00
comments (0)
Freedman Healthcare hacked, database software used by 27 state public health departments | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:56
comments (0)
Hackers claim attack on Scania, website down | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:49
comments (0)
PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:41
comments (1)
Scattered Spider, fresh off retail sector attack spree, pivots to insurance industry | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:32
comments (0)
Scooter - An interactive search and replace for the terminal.
(github.com)
in rust@lemmy.ml from dessalines@lemmy.ml on 16 Jun 15:16
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from dessalines@lemmy.ml on 16 Jun 15:16
comments (0)
dupe: rust@programming.dev (0)
What does assign a generic in a trait?
in rust@programming.dev from capuccino@lemmy.world on 17 Jun 00:11
comments (7)
in rust@programming.dev from capuccino@lemmy.world on 17 Jun 00:11
comments (7)
Report Links Los Pollos and RichAds to Malware Traffic Operations
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 18:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 18:45
comments (0)
GrayAlpha Unmasked: New FIN7-Linked Infrastructure, PowerNet Loader, and Fake Update Attacks
(www.recordedfuture.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:53
comments (0)
Rust Surveying Developers To Find Biggest Compiler Performance Issues
(www.phoronix.com)
in rust@programming.dev from cm0002@lemmy.world on 16 Jun 17:51
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 16 Jun 17:51
comments (0)
Washington Post's email system hacked, journalists' accounts compromised
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:45
comments (0)
Apple and Google Still Have a Chinese VPN Problem
(www.techtransparencyproject.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:09
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:09
comments (0)
Zoomcar discloses security breach impacting 8.4 million users
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 16:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 16:59
comments (0)
BERT Ransomware Upgrades to Attacks Linux Machines Using Weaponized ELF Files
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:33
comments (0)
eSentire | Don't Get Caught in the Headlights - DeerStealer Analysis
(www.esentire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:25
comments (0)
Microsoft: June Windows Server security updates cause DHCP issues
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:17
comments (1)
Google Play Store Alert: New Phishing Apps Bypass Security, Stealing Crypto Wallet Seeds
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:10
comments (0)
Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:01
comments (0)
Government offices in North Carolina, Georgia disrupted by cyberattacks | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:57
comments (0)
Over 46,000 Grafana instances exposed to account takeover bug
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:49
comments (0)
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:42
comments (0)
Ransomware Group Threatens to Dump Paraguayan Citizens' Data
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:34
comments (0)
WestJet investigates cyberattack disrupting internal systems
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:25
comments (0)
A JPEG With A Payload
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jun 11:18
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jun 11:18
comments (0)
Even paying victims lose their data with Anubis ransomware
(www.techzine.eu)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 16 Jun 09:54
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 16 Jun 09:54
comments (1)
A New Rust Packaging Model in Guix
(guix.gnu.org)
in rust@lemmy.ml from HaraldvonBlauzahn@feddit.org on 15 Jun 09:26
comments (0)
dupe: rust@programming.dev (0)
dupe: programming@programming.dev (1)
in rust@lemmy.ml from HaraldvonBlauzahn@feddit.org on 15 Jun 09:26
comments (0)
dupe: rust@programming.dev (0)
dupe: programming@programming.dev (1)
Project Gemini FAQ
(geminiprotocol.net)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 16 Jun 05:51
comments (0)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 16 Jun 05:51
comments (0)
Google Cloud incident report
(status.cloud.google.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jun 23:58
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jun 23:58
comments (2)
The Guardian, in collaboration with the University of Cambridge Department of Computer Science, launches open-source Secure Messaging
(www.theguardian.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 15 Jun 22:29
comments (7)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 15 Jun 22:29
comments (7)
Introduction - redo: a recursive build system
(redo.readthedocs.io)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 15 Jun 08:18
comments (3)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 15 Jun 08:18
comments (3)
Flutter is kinda good
in programming@programming.dev from verstra@programming.dev on 15 Jun 07:16
comments (22)
in programming@programming.dev from verstra@programming.dev on 15 Jun 07:16
comments (22)
Gameshow paradox - interactive simulation in JavaScript
(slicker.me)
in programming@programming.dev from cm0002@lemmy.world on 15 Jun 04:36
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 15 Jun 04:36
comments (2)
Why Mario 64 is a Gameboy Advance game
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 14 Jun 15:51
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 14 Jun 15:51
comments (2)
The Leo Text Editor's Home Page
(leo-editor.github.io)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 14 Jun 15:33
comments (1)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 14 Jun 15:33
comments (1)
How iceoryx2 implements true zero-copy communication
(ekxide.io)
in programming@programming.dev from elBoberido@programming.dev on 14 Jun 11:03
comments (0)
in programming@programming.dev from elBoberido@programming.dev on 14 Jun 11:03
comments (0)
Ubuntu 25.10 Switches to Rust-based Sudo
(www.omgubuntu.co.uk)
in rust@lemmy.ml from dessalines@lemmy.ml on 13 Jun 17:00
comments (0)
dupe: rust@programming.dev (31)
in rust@lemmy.ml from dessalines@lemmy.ml on 13 Jun 17:00
comments (0)
dupe: rust@programming.dev (31)
This Week in Rust 603
(this-week-in-rust.org)
in rust@programming.dev from cm0002@lemmy.world on 13 Jun 23:25
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 13 Jun 23:25
comments (0)
Ubuntu 25.10 Adds New Rust Library to Default Installs
(www.omgubuntu.co.uk)
in programming@programming.dev from tonytins@pawb.social on 13 Jun 17:48
comments (0)
in programming@programming.dev from tonytins@pawb.social on 13 Jun 17:48
comments (0)
Discord flaw lets hackers reuse expired invites in malware campaign
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from tonytins@pawb.social on 13 Jun 16:18
comments (0)
in cybersecurity@sh.itjust.works from tonytins@pawb.social on 13 Jun 16:18
comments (0)
Apple confirmed that Messages app flaw was actively exploited in the wild
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:35
comments (0)
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:25
comments (0)
Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:09
comments (0)
Microsoft: KB5060533 update triggers boot errors on Surface Hub v1 devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:02
comments (0)
Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper | Trend Micro (US)
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 13:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 13:57
comments (0)
Spanish arm of French insurance giant posted on hacker forum
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:40
comments (0)
Cloudflare: Outage not caused by security incident, data is safe
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:25
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:25
comments (2)
LockBit panel data leak shows Chinese orgs among the most targeted - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:18
comments (0)
NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
(www.synacktiv.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:09
comments (0)
JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:00
comments (0)
New 'SmartAttack' Steals Air-Gapped Data Using Smartwatches - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:56
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:56
comments (3)
Hackers claim fresh T-Mobile data breach | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:50
comments (0)
Europol Says Criminal Demand for Data is “Skyrocketing”
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:37
comments (0)
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Jun 00:49
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Jun 00:49
comments (0)
Rust JSON Prettry Print v0.1.2: Formatea JSON Fácilmente
(www.youtube.com)
in rust@programming.dev from cm0002@lemmy.world on 12 Jun 23:06
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 12 Jun 23:06
comments (0)
Internet cut affects Google Cloud and impacts services worldwide
(www.thenationalnews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 22:52
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 22:52
comments (2)
What would be the best way to store the country of a user in SQL?
in programming@programming.dev from lena@gregtech.eu on 12 Jun 18:25
comments (41)
in programming@programming.dev from lena@gregtech.eu on 12 Jun 18:25
comments (41)
Faster coding isn't enough - AI's untapped power in software development
in programming@programming.dev from BenLloydPearson@programming.dev on 12 Jun 17:39
comments (0)
in programming@programming.dev from BenLloydPearson@programming.dev on 12 Jun 17:39
comments (0)
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 16:44
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 16:44
comments (0)
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 16:39
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 16:39
comments (5)
Urgent Firefox Alert: Critical Memory Corruption Flaws (CVSS 9.8) Allow Remote Code Execution
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 14:01
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 14:01
comments (7)
GitLab patches high severity account takeover, missing auth issues
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:57
comments (0)
Stealth Falcon APT Exploits Microsoft RCE Zero-Day
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:48
comments (0)
OWASP Nettacker: Open-source scanner for recon and vulnerability assessment - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:42
comments (0)
NIST touts 19 ways to build "off the shelf" Zero Trust Architecture in new guidance | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:26
comments (1)
Erie Insurance confirms cyberattack behind business disruptions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:17
comments (1)
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:10
comments (0)
Global analysis of Adversary-in-the-Middle phishing threats - Sekoia.io Blog
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:03
comments (0)
New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 12:58
comments (0)
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 12:38
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 12:38
comments (0)
Russian hybrid warfare: Ukraine's success offers lessons for Europe
(www.atlanticcouncil.org)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 12 Jun 07:19
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 12 Jun 07:19
comments (0)
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
(www.interpol.int)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 04:11
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 04:11
comments (0)
rustc_codegen_gcc: Progress Report #36
(blog.antoyo.xyz)
in rust@programming.dev from antoyo@programming.dev on 11 Jun 21:08
comments (7)
in rust@programming.dev from antoyo@programming.dev on 11 Jun 21:08
comments (7)
How should I tackle this problem?
in programming@programming.dev from ZILtoid1991@lemmy.world on 11 Jun 19:18
comments (7)
in programming@programming.dev from ZILtoid1991@lemmy.world on 11 Jun 19:18
comments (7)
Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an email
(www.aim.security)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 18:48
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 18:48
comments (1)
New Secure Boot flaw lets attackers install bootkit malware, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 18:03
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 18:03
comments (1)
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:58
comments (0)
Hackers exploited Windows WebDav zero-day to drop malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:50
comments (0)
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:41
comments (1)
Salesforce Industry Cloud Hit by 20 Vulnerabilities Including 0days
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:24
comments (0)
Why would you want to sign your commits with PGP? Is SSH insufficient?
in cybersecurity@sh.itjust.works from Custodian6718@programming.dev on 11 Jun 13:23
comments (6)
in cybersecurity@sh.itjust.works from Custodian6718@programming.dev on 11 Jun 13:23
comments (6)
“Oral pleasure” app potentially leaks millions of messages and GPS locations
(cybernews.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:58
comments (2)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:58
comments (2)
New BrowserVenom malware being distributed via fake DeepSeek phishing website
(securelist.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:42
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:42
comments (1)
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:40
comments (0)
84% of Organizations’ SOC Analysts are Unknowingly Investigating the Same Incidents
(www.globenewswire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:32
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:32
comments (2)
VU#211341 - A vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variable
(kb.cert.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:26
comments (0)
40,000 cameras expose feeds to datacenters, health clinics • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:18
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:18
comments (4)
Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:09
comments (0)
Ivanti Workspace Control hardcoded key flaws expose SQL credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:58
comments (0)
Trove of port agency’s data stolen, hackers claim | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:48
comments (0)
Facebook malvertising reveals 4K domains spoofing 68 brands | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:42
comments (0)
June 2025 Patch Tuesday: Microsoft Fixes 66 Bugs, Including Active 0-Day
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:32
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:32
comments (2)
C is one of the most energy saving language
in programming@programming.dev from chimay@lemmy.world on 11 Jun 08:42
comments (95)
in programming@programming.dev from chimay@lemmy.world on 11 Jun 08:42
comments (95)
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage.
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jun 22:03
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jun 22:03
comments (0)
FIN6 hackers pose as job seekers to backdoor recruiters’ devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 18:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 18:34
comments (0)
Release v2.4.4 · jahirfiquitiva/Blueprint · "Free, feature-rich, easily customizable Android dashboard for icon packs "
(dashbud.dev)
in programming@programming.dev from otters_raft@lemmy.ca on 10 Jun 18:00
comments (0)
in programming@programming.dev from otters_raft@lemmy.ca on 10 Jun 18:00
comments (0)
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:49
comments (0)
Critical Vulnerability Patched in SAP NetWeaver - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:42
comments (0)
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:32
comments (0)
Massive Heroku outage impacts web platforms worldwide
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:24
comments (0)