programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Best C# IDE/Compiler for Linux?
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:07
comments (12)
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:07
comments (12)
Ignoring lemmyhate, are programmers really using AI to be more efficient?
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:02
comments (24)
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:02
comments (24)
Real-Time C/C++/Rust Build Visualizer ・ Daniel Hooper
(danielchasehooper.com)
in programming@programming.dev from ruffsl@programming.dev on 15 Aug 05:21
comments (1)
in programming@programming.dev from ruffsl@programming.dev on 15 Aug 05:21
comments (1)
[Help] Storage Optimization Algorithm
in programming@programming.dev from uninvitedguest@lemmy.ca on 15 Aug 03:37
comments (4)
in programming@programming.dev from uninvitedguest@lemmy.ca on 15 Aug 03:37
comments (4)
For $40, you can buy stolen police and government email accounts
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
New awesome version of deku_string
in rust@programming.dev from blazebra@programming.dev on 14 Aug 16:32
comments (1)
in rust@programming.dev from blazebra@programming.dev on 14 Aug 16:32
comments (1)
Malvertising campaign leads to PS1Bot, a multi-stage malware framework
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
Data leak could cut electricity to Mexico | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
Pennsylvania attorney general's email, site down after cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
Major HTTP flaw puts 24 million websites at risk | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (7)
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
Microsoft fixes "BadSuccessor" Kerberos vulnerability (CVE-2025-53779) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
Hackers Raid Dutch Lab, Stealing Data on 500,000 Patients - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:34
comments (0)
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:25
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:25
comments (2)
Home Office Phishing Scam Targets UK Immigration Sponsors - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:17
comments (0)
Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:10
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:10
comments (1)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition
(vreme.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 13:02
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 13:02
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks
(www.aspistrategist.org.au)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 04:51
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 04:51
comments (0)
Go 1.25 Released With Experimental GC Yielding 10~40% Overhead Reduction
(www.phoronix.com)
in golang@programming.dev from cm0002@piefed.world on 13 Aug 00:48
comments (1)
in golang@programming.dev from cm0002@piefed.world on 13 Aug 00:48
comments (1)
Russia Is Suspected to Be Behind Breach of Federal Court Filing System
(archive.ph)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 23:10
comments (0)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 23:10
comments (0)
Go 1.25 Release Notes - The Go Programming Language
(go.dev)
in golang@programming.dev from jwr1@kbin.earth on 12 Aug 23:02
comments (0)
in golang@programming.dev from jwr1@kbin.earth on 12 Aug 23:02
comments (0)
Saint Paul cyberattack linked to Interlock ransomware gang
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 17:02
comments (0)
Scattered Spider and ShinyHunters' Next Move: Leaking Data
(www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:58
comments (0)
ShinyHunters Unveils That BreachForums Taken by Law Enforcement Agencies, Now It Is a Honeypot
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 16:56
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 16:56
comments (1)
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises | Trend Micro (US)
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:48
comments (0)
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:41
comments (0)
Flaws in Major Automaker's Dealership Systems Allowed Car Hacking, Personal Data Theft - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:32
comments (0)
Over 29,000 Exchange servers unpatched against high-severity flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:25
comments (0)
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:16
comments (0)
Hackers steal Google Ads business contact data | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:09
comments (0)
Comby is a tool for searching and changing code structure
(comby.dev)
in programming@programming.dev from paequ2@lemmy.today on 12 Aug 07:24
comments (4)
in programming@programming.dev from paequ2@lemmy.today on 12 Aug 07:24
comments (4)
Effortless Rust Development with Nix | Devshells, Packaging & Beyond - YouTube
(youtube.com)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 21:08
comments (0)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 21:08
comments (0)
Bevy's Fifth Birthday
(bevy.org)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 20:37
comments (1)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 20:37
comments (1)
GitHub CEO to step down
(www.axios.com)
in programming@programming.dev from who@feddit.org on 11 Aug 18:46
comments (46)
in programming@programming.dev from who@feddit.org on 11 Aug 18:46
comments (46)
MuddyWater’s DarkBit ransomware cracked for free data recovery
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:26
comments (0)
Connex Credit Union data breach impacts 172,000 members
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:14
comments (0)
Building blocks for idiomatic Go pipelines
(antonz.org)
in golang@programming.dev from cm0002@lemmy.world on 11 Aug 16:30
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 11 Aug 16:30
comments (1)
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:44
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:44
comments (6)
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscaler, and NetSkope
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:30
comments (0)
Data Dump From APT Actor Yields Clues to Attacker Capabilities
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:34
comments (0)
Ransomware Attacks Fall by Almost Half in Q2
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:26
comments (0)
Google Calendar invites let researchers hijack Gemini to leak user data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:17
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:17
comments (2)
U.S. Judiciary confirms breach of court electronic records service
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:09
comments (0)
Cancer care provider breach exposes 113K+ patients | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:01
comments (0)
GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:56
comments (0)
15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:48
comments (1)
Boeing, US Navy supplier Jamco Aerospace claimed in ransomware attack | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:42
comments (1)
WinRAR zero-day exploited to plant malware on archive extraction
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:33
comments (2)
Australian Regulator Sues Optus Over 2022 Data Breach
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:12
comments (0)
The inside story of the Telemessage saga, and how you can view the data
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 22:16
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 22:16
comments (0)
Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises
(julsimon.medium.com)
in programming@programming.dev from vermaterc@lemmy.ml on 10 Aug 10:38
comments (9)
in programming@programming.dev from vermaterc@lemmy.ml on 10 Aug 10:38
comments (9)
Do you love Open Source software? Want to turn your passion into a paid job 💵? LibreOffice is hiring a remote Paid Developer focusing on UI with initial emphasis on macOS, preferably full-time 📢
(blog.documentfoundation.org)
in programming@programming.dev from Davriellelouna@lemmy.world on 09 Aug 21:14
comments (3)
in programming@programming.dev from Davriellelouna@lemmy.world on 09 Aug 21:14
comments (3)
Rust 1.89 expands x86 support, stabilizes APIs, and downgrades macOS x86_64 support
(alternativeto.net)
in programming@programming.dev from tonytins@pawb.social on 09 Aug 01:01
comments (4)
in programming@programming.dev from tonytins@pawb.social on 09 Aug 01:01
comments (4)
Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds
(www.wired.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 00:08
comments (27)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 00:08
comments (27)
Is it fine if a website says "email already in use" before you hit submit?
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 22:14
comments (42)
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 22:14
comments (42)
Security Researchers found a way to trick Windows Hello authentication, but there is a simple fix - gHacks Tech News
(www.ghacks.net)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 15:57
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 15:57
comments (1)
IT-TOOLS - Collection of handy online tools for developers, with great UX
(it-tools.tech)
in programming@programming.dev from cm0002@lemmy.world on 08 Aug 14:10
comments (6)
in programming@programming.dev from cm0002@lemmy.world on 08 Aug 14:10
comments (6)
The 17-character code that runs the automotive world
(cardog.app)
in programming@programming.dev from Pro@programming.dev on 08 Aug 09:27
comments (3)
in programming@programming.dev from Pro@programming.dev on 08 Aug 09:27
comments (3)
🧪 Is your Go code really battle-tested?
(levelup.gitconnected.com)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 06:22
comments (0)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 06:22
comments (0)
🚀 Want to write cleaner, faster, and safer Go microservices in 2025?
(levelup.gitconnected.com)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 05:52
comments (1)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 05:52
comments (1)
Introducing PaperCache, an in-memory cache that can switch its eviction policy dynamically
(papercache.io)
in programming@programming.dev from papercache@programming.dev on 08 Aug 05:17
comments (0)
dupe: rust@programming.dev (8)
in programming@programming.dev from papercache@programming.dev on 08 Aug 05:17
comments (0)
dupe: rust@programming.dev (8)
A new worst coder has entered the chat: vibe coding without code knowledge
(stackoverflow.blog)
in programming@programming.dev from Pro@programming.dev on 07 Aug 18:38
comments (15)
in programming@programming.dev from Pro@programming.dev on 07 Aug 18:38
comments (15)
What Git clients do you use?
in programming@programming.dev from Faalangst_26@feddit.nl on 07 Aug 16:41
comments (92)
in programming@programming.dev from Faalangst_26@feddit.nl on 07 Aug 16:41
comments (92)
GenAI Used to Impersonate Brazil’s Govt Websites | ThreatLabz
(www.zscaler.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:24
comments (0)
Shared secret: EDR killer in the kill chain – Sophos News
(news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:17
comments (0)
Makop Ransomware Identified in Attacks in South Korea - ASEC
(asec.ahnlab.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:10
comments (0)
Google suffers data breach in ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:01
comments (0)
KLM Confirms Customer Data Breach Linked to Third-Party System
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:57
comments (1)
Ukraine claims to have hacked secrets from Russia's newest nuclear submarine
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:50
comments (0)
Announcing Rust 1.89.0
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 07 Aug 13:24
comments (12)
in rust@programming.dev from nemeski@mander.xyz on 07 Aug 13:24
comments (12)
Rust Making Progress On Its 2025 Project Goals
(www.phoronix.com)
in rust@programming.dev from cm0002@piefed.world on 07 Aug 03:18
comments (1)
in rust@programming.dev from cm0002@piefed.world on 07 Aug 03:18
comments (1)
Visualise your Go program runtime metrics in real time in the browser with Statsviz (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
GCC Front-End For Rust - July 2025 Monthly report
(rust-gcc.github.io)
in rust@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
New Method Is the Fastest Way To Find the Best Routes
(www.quantamagazine.org)
in programming@programming.dev from misk@piefed.social on 06 Aug 20:26
comments (11)
in programming@programming.dev from misk@piefed.social on 06 Aug 20:26
comments (11)
Gov+
(www.bbb.org)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 18:34
comments (4)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 18:34
comments (4)
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 16:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 16:23
comments (0)
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 14:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 14:49
comments (0)
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto | SentinelOne
(www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:08
comments (0)
Rapid Breach: Social Engineering to Remote Access in 300 Seconds | NCC Group
(www.nccgroup.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:00
comments (0)
Cybersecurity Services, Solutions & Products. Global Provider | Group-IB
(www.group-ib.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:56
comments (0)
Pandora confirms data breach amid ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:49
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:49
comments (1)
PBS confirms data breach after employee info leaked on Discord servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:40
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:40
comments (2)
Cisco User Data Stolen in Vishing Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:33
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:33
comments (4)
Zellij 0.43 just released - bringing the terminal to your browser
(www.reddit.com)
in programming@programming.dev from lens0021@lemmy.ml on 06 Aug 04:45
comments (3)
in programming@programming.dev from lens0021@lemmy.ml on 06 Aug 04:45
comments (3)
lib.rs has a special surprise when you search "twitter"
(lib.rs)
in rust@programming.dev from qaz@lemmy.world on 05 Aug 20:02
comments (14)
in rust@programming.dev from qaz@lemmy.world on 05 Aug 20:02
comments (14)
curl -v https://google.com
(www.youtube.com)
in programming@programming.dev from mesamunefire@piefed.social on 05 Aug 18:51
comments (3)
in programming@programming.dev from mesamunefire@piefed.social on 05 Aug 18:51
comments (3)
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
(socket.dev)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 13:01
comments (0)
Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
(blog.cloudflare.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:58
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:58
comments (5)
LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:50
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:50
comments (6)
Ransomware groups shift to quadruple extortion to maximize pressure - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:42
comments (0)
Nvidia Patches Critical RCE Vulnerability Chain
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 12:35
comments (0)
Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integrity
(cispa.de)
in programming@programming.dev from Pro@mander.xyz on 05 Aug 09:14
comments (5)
in programming@programming.dev from Pro@mander.xyz on 05 Aug 09:14
comments (5)
Gateway pattern for external service calls (Golang)
(rednafi.com)
in golang@programming.dev from cm0002@programming.dev on 04 Aug 23:25
comments (0)
in golang@programming.dev from cm0002@programming.dev on 04 Aug 23:25
comments (0)
Perfecting anti-aliasing on signed distance functions
(blog.pkh.me)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 04 Aug 22:26
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 04 Aug 22:26
comments (0)
A Gentle Introduction To Fortran
(hackaday.com)
in programming@programming.dev from cm0002@lemmy.world on 04 Aug 18:41
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 04 Aug 18:41
comments (0)
Ransomware gangs join attacks targeting Microsoft SharePoint servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 17:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 17:38
comments (0)
From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 17:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 17:29
comments (1)
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 16:55
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 16:55
comments (2)
Handling of unlikely syscall errors
in programming@programming.dev from hades@programming.dev on 04 Aug 13:23
comments (14)
in programming@programming.dev from hades@programming.dev on 04 Aug 13:23
comments (14)
Attackers exploit link-wrapping services to steal Microsoft 365 logins
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:25
comments (0)
Pi-hole discloses data breach triggered by WordPress plugin flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:16
comments (1)
Average global data breach cost now $4.44 million - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:09
comments (0)
SonicWall firewall devices hit in surge of Akira ransomware attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 12:01
comments (0)
AI-powered Cursor IDE vulnerable to prompt-injection attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:56
comments (0)
Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities
(www.greynoise.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:49
comments (0)
Search Engines are Indexing ChatGPT Conversations! - Here is our OSINT Research
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:40
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:40
comments (3)
Threat actor uses AI to create a better crypto wallet drainer
(getsafety.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:32
comments (0)
APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 11:26
comments (0)
Update on the Node for my allocator
in rust@programming.dev from fluffy_hub@programming.dev on 04 Aug 01:15
comments (0)
in rust@programming.dev from fluffy_hub@programming.dev on 04 Aug 01:15
comments (0)
Constant Entropy RNG
in programming@programming.dev from AshrafIbrahim03@programming.dev on 03 Aug 21:41
comments (1)
in programming@programming.dev from AshrafIbrahim03@programming.dev on 03 Aug 21:41
comments (1)
Unpopular opinion: 95% percent of all modern programming langueges are either bloated/proprietary/unneccesarily complex. pretty sure C & assembly can do it all (even for web development,
in programming@programming.dev from MorganWorshipsTheGPL@mastodon.social on 03 Aug 21:02
comments (14)
in programming@programming.dev from MorganWorshipsTheGPL@mastodon.social on 03 Aug 21:02
comments (14)
Up and Down the Ladder of Abstraction
(worrydream.com)
in programming@programming.dev from cm0002@lemmy.world on 03 Aug 17:05
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 03 Aug 17:05
comments (1)
A parser and interpreter for a very small language
(blog.ploeh.dk)
in programming@programming.dev from learnbyexample@programming.dev on 03 Aug 12:26
comments (0)
in programming@programming.dev from learnbyexample@programming.dev on 03 Aug 12:26
comments (0)
Linus Torvalds on how and when to maintain a clean git history (2009)
(www.mail-archive.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 03 Aug 07:50
comments (18)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 03 Aug 07:50
comments (18)
What does everyone think of this new WIP language?
(git.urbach.dev)
in programming@programming.dev from treeshateorcs@programming.dev on 03 Aug 01:53
comments (37)
in programming@programming.dev from treeshateorcs@programming.dev on 03 Aug 01:53
comments (37)
AWS deleted my 10-year account and all data without warning
(www.seuros.com)
in programming@programming.dev from Pro@programming.dev on 02 Aug 22:40
comments (68)
in programming@programming.dev from Pro@programming.dev on 02 Aug 22:40
comments (68)
`\Device\Afd`, or, the Deal with the Devil that makes async Rust work on Windows (2023)
(notgull.net)
in programming@programming.dev from Kissaki@programming.dev on 02 Aug 12:01
comments (5)
dupe: rust@programming.dev (1)
in programming@programming.dev from Kissaki@programming.dev on 02 Aug 12:01
comments (5)
dupe: rust@programming.dev (1)
China accuses US of exploiting Microsoft zero-day in cyberattack
(cyberscoop.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 02 Aug 10:56
comments (3)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 02 Aug 10:56
comments (3)
Madeleine Mortensen: Jujutsu For Busy Devs (Part 1)
(maddie.wtf)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 02 Aug 10:17
comments (38)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 02 Aug 10:17
comments (38)
We Asked 100+ AI Models to Write Code. The Results: AI-generated Code That Works, But Isn’t Safe
(www.veracode.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 02 Aug 08:26
comments (32)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 02 Aug 08:26
comments (32)
Live coding interviews measure stress, not coding skils
(hadid.dev)
in programming@programming.dev from BlackEco@lemmy.blackeco.com on 02 Aug 06:20
comments (66)
in programming@programming.dev from BlackEco@lemmy.blackeco.com on 02 Aug 06:20
comments (66)
As AI use rises, developers trust it less!
(www.youtube.com)
in programming@programming.dev from SmartmanApps@programming.dev on 01 Aug 23:50
comments (4)
in programming@programming.dev from SmartmanApps@programming.dev on 01 Aug 23:50
comments (4)
Summer of Making: a temporary rewards program sponsored by GitHub to get minors to make coding projects
(summer.hack.club)
in programming@programming.dev from Aatube@kbin.melroy.org on 01 Aug 20:09
comments (7)
in programming@programming.dev from Aatube@kbin.melroy.org on 01 Aug 20:09
comments (7)
Daniele Procida: My favourite German word (On documentation and knowledge organization)
(vurt.org)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 01 Aug 17:53
comments (1)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 01 Aug 17:53
comments (1)
Developer survey shows trust in AI coding tools is falling as usage rises
(arstechnica.com)
in programming@programming.dev from cm0002@lemmy.world on 01 Aug 17:17
comments (8)
in programming@programming.dev from cm0002@lemmy.world on 01 Aug 17:17
comments (8)
When you begin writing Rust like this...
in rust@programming.dev from fluffy_hub@programming.dev on 01 Aug 16:17
comments (8)
in rust@programming.dev from fluffy_hub@programming.dev on 01 Aug 16:17
comments (8)
Stack Overflow is becoming a resource for developers that need to solve AI-related issues
(survey.stackoverflow.co)
in programming@programming.dev from staircase@programming.dev on 01 Aug 12:33
comments (4)
in programming@programming.dev from staircase@programming.dev on 01 Aug 12:33
comments (4)
This project uses Docker to create an environment where you can run containers on a remote host, in such a way that your local working directory is visible to the container and optionally use X11.
(github.com)
in programming@programming.dev from vk6flab@lemmy.radio on 01 Aug 10:29
comments (3)
in programming@programming.dev from vk6flab@lemmy.radio on 01 Aug 10:29
comments (3)
This Week in Rust 610 · This Week in Rust
(this-week-in-rust.org)
in rust@lemmy.ml from muad_dibber@lemmygrad.ml on 31 Jul 22:20
comments (0)
dupe: rust@programming.dev (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from muad_dibber@lemmygrad.ml on 31 Jul 22:20
comments (0)
dupe: rust@programming.dev (0)
dupe: rust@programming.dev (0)
Our first outage from LLM-written code
(sketch.dev)
in programming@programming.dev from skip0110@lemmy.zip on 01 Aug 02:00
comments (8)
in programming@programming.dev from skip0110@lemmy.zip on 01 Aug 02:00
comments (8)
How can I prevent JSON from being unmarshaled into a field of a struct?
in golang@programming.dev from lena@gregtech.eu on 31 Jul 15:54
comments (1)
in golang@programming.dev from lena@gregtech.eu on 31 Jul 15:54
comments (1)
is it worth learning golang?
in programming@programming.dev from thetreesaysbark@sh.itjust.works on 31 Jul 15:31
comments (30)
in programming@programming.dev from thetreesaysbark@sh.itjust.works on 31 Jul 15:31
comments (30)
Worktrees: Git's best kept secret (and why you should use them) | Tom Ups
(www.tomups.com)
in programming@programming.dev from dessalines@lemmy.ml on 31 Jul 14:20
comments (23)
in programming@programming.dev from dessalines@lemmy.ml on 31 Jul 14:20
comments (23)
Do AI coding tools help with imposter syndrome or make it worse?
(stackoverflow.blog)
in programming@programming.dev from Pro@programming.dev on 31 Jul 13:30
comments (4)
in programming@programming.dev from Pro@programming.dev on 31 Jul 13:30
comments (4)
SafePay ransomware threatens to leak 3.5TB of Ingram Micro data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:40
comments (0)
Inc Ransomware Claims 1.2TB Data Breach at Dollar Tree
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:33
comments (0)
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:25
comments (0)
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:16
comments (0)
Hackers stole Social Security numbers during Allianz Life cyberattack | TechCrunch
(techcrunch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 12:10
comments (0)
Old Code Gets Younger Every Year. The threat of decaying technology looms, by Marianne Bellotti
(medium.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 31 Jul 04:21
comments (4)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 31 Jul 04:21
comments (4)
Golang client for NATS, the cloud native messaging system
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 30 Jul 17:29
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 30 Jul 17:29
comments (0)
The pest book is finally complete now!
(github.com)
in rust@programming.dev from cm0002@lemmy.world on 30 Jul 14:44
comments (0)
dupe: rust@lemmy.ml (0)
in rust@programming.dev from cm0002@lemmy.world on 30 Jul 14:44
comments (0)
dupe: rust@lemmy.ml (0)
Another sign of Sourcegraph's uneventful death: Cody's body
(github.com)
in programming@programming.dev from QuazarOmega@lemy.lol on 30 Jul 16:45
comments (2)
in programming@programming.dev from QuazarOmega@lemy.lol on 30 Jul 16:45
comments (2)
Contributor Covenant 3.0 released
(fosstodon.org)
in programming@programming.dev from pylapp@programming.dev on 30 Jul 09:05
comments (1)
in programming@programming.dev from pylapp@programming.dev on 30 Jul 09:05
comments (1)
Really good Guile Scheme crash course
(www.youtube.com)
in programming@programming.dev from paequ2@lemmy.today on 30 Jul 04:12
comments (6)
in programming@programming.dev from paequ2@lemmy.today on 30 Jul 04:12
comments (6)
A theory I have
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 29 Jul 17:09
comments (33)
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 29 Jul 17:09
comments (33)
2025 Stack Overflow Developer Survey
(survey.stackoverflow.co)
in programming@programming.dev from Pro@programming.dev on 29 Jul 16:03
comments (11)
in programming@programming.dev from Pro@programming.dev on 29 Jul 16:03
comments (11)
China-linked group Fire Ant exploits VMware and F5 flaws since early 2025
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:57
comments (1)
Pro-Ukrainian hackers claim massive cyberattack on Russia's Aeroflot | Reuters
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:48
comments (1)
Resecurity | Methods to Bypass OTP in Mobile Apps: Successful VAPT Scenarios
(www.resecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:40
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:40
comments (1)
Cybersecurity Scams Targeting Fans and Teams at the 2025 Belgian Grand Prix | CloudSEK
(www.cloudsek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:32
comments (0)
Citrix NetScaler Devices Memory Leak: CVE-2025-5777
(www.sonicwall.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:25
comments (0)
Exploit available for critical Cisco ISE bug exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:18
comments (0)
Spy satellite agency says law enforcement probing 'incident' affecting contracting site | Reuters
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:10
comments (0)
The Huawei Dilemma: Why Europe Needs Strong Intelligence Guardrails
(www.thecipherbrief.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Jul 12:08
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Jul 12:08
comments (0)
Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 12:01
comments (0)
CISA flags PaperCut RCE bug as exploited in attacks, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 11:58
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 11:58
comments (1)
GLOBAL GROUP Ransomware Claims Breach of Media Giant Albavisión
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 11:49
comments (0)
Naval Group Denies Hack Claims, Alleges “Reputational Attack” - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Jul 11:42
comments (0)
Ranking programming languages by energy efficiency (2021)
(www.sciencedirect.com)
in programming@programming.dev from pylapp@programming.dev on 29 Jul 09:19
comments (32)
in programming@programming.dev from pylapp@programming.dev on 29 Jul 09:19
comments (32)
Creating Your First Game with Ebitengine (Go game engine)
(www.youtube.com)
in golang@programming.dev from cm0002@lemmy.world on 29 Jul 06:15
comments (0)
dupe: programming@programming.dev (0)
in golang@programming.dev from cm0002@lemmy.world on 29 Jul 06:15
comments (0)
dupe: programming@programming.dev (0)
Jean-Baptiste Kempf - Kyber: a new approach for real-time video and controls streaming based on Quic - YouTube
(youtube.com)
in rust@programming.dev from ruffsl@programming.dev on 29 Jul 03:20
comments (0)
dupe: programming@programming.dev (2)
in rust@programming.dev from ruffsl@programming.dev on 29 Jul 03:20
comments (0)
dupe: programming@programming.dev (2)
How to deal with a not so good related team that always asks for help?
in programming@programming.dev from potatoguy@potato-guy.space on 28 Jul 22:18
comments (31)
in programming@programming.dev from potatoguy@potato-guy.space on 28 Jul 22:18
comments (31)
Full-Fat, Kernel-Ready: Why RISC-V Linux Needs Everyone Upstream
(riscv.org)
in programming@programming.dev from Pro@programming.dev on 28 Jul 17:18
comments (1)
in programming@programming.dev from Pro@programming.dev on 28 Jul 17:18
comments (1)
The Hare programming language
(harelang.org)
in programming@programming.dev from cm0002@lemmy.world on 28 Jul 15:51
comments (11)
in programming@programming.dev from cm0002@lemmy.world on 28 Jul 15:51
comments (11)
IP over Avian Carriers - Wikipedia
(en.wikipedia.org)
in programming@programming.dev from mesamunefire@piefed.social on 28 Jul 17:07
comments (8)
in programming@programming.dev from mesamunefire@piefed.social on 28 Jul 17:07
comments (8)
Can't decide if end user index access should be 0 or 1 based and if END index should be inclusive
in programming@programming.dev from thingsiplay@beehaw.org on 28 Jul 16:40
comments (20)
in programming@programming.dev from thingsiplay@beehaw.org on 28 Jul 16:40
comments (20)
This Week in Rust 609 · This Week in Rust
(this-week-in-rust.org)
in rust@lemmy.ml from dessalines@lemmy.ml on 27 Jul 11:14
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from dessalines@lemmy.ml on 27 Jul 11:14
comments (0)
dupe: rust@programming.dev (0)
vivo BlueOS Kernel – Written in Rust, compatible with POSIX.
(github.com)
in programming@programming.dev from Pro@reddthat.com on 28 Jul 08:55
comments (0)
in programming@programming.dev from Pro@reddthat.com on 28 Jul 08:55
comments (0)
I quit my job to make my own game. Toll Booth Simulator
in programming@programming.dev from laradev@programming.dev on 27 Jul 06:18
comments (5)
in programming@programming.dev from laradev@programming.dev on 27 Jul 06:18
comments (5)
I quit my job to make my own game. Toll Booth Simulator
in programming@programming.dev from laradev@programming.dev on 27 Jul 06:18
comments (56)
in programming@programming.dev from laradev@programming.dev on 27 Jul 06:18
comments (56)
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from MrSoup@lemmy.zip on 27 Jul 05:26
comments (0)
in cybersecurity@sh.itjust.works from MrSoup@lemmy.zip on 27 Jul 05:26
comments (0)
Thoughts on codecademy site?
in programming@programming.dev from GrumpyCat@leminal.space on 27 Jul 00:49
comments (19)
in programming@programming.dev from GrumpyCat@leminal.space on 27 Jul 00:49
comments (19)
JetBrains working on higher-abstraction programming language
(www.infoworld.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 17:40
comments (36)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 17:40
comments (36)
What's the best way for testing Gin routes in Go?
in programming@programming.dev from lena@gregtech.eu on 26 Jul 16:00
comments (0)
in programming@programming.dev from lena@gregtech.eu on 26 Jul 16:00
comments (0)
Explaining Why Devs Burn Out So Often
(www.youtube.com)
in programming@programming.dev from Samskara@sh.itjust.works on 26 Jul 15:49
comments (6)
in programming@programming.dev from Samskara@sh.itjust.works on 26 Jul 15:49
comments (6)
What's the best way for testing Gin routes in Go?
in golang@programming.dev from lena@gregtech.eu on 26 Jul 15:37
comments (2)
in golang@programming.dev from lena@gregtech.eu on 26 Jul 15:37
comments (2)
Getting Started with Ebitengine (Go game engine)
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 05:00
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 05:00
comments (1)
Guix for development
(dthompson.us)
in programming@programming.dev from paequ2@lemmy.today on 25 Jul 23:56
comments (10)
in programming@programming.dev from paequ2@lemmy.today on 25 Jul 23:56
comments (10)
Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Jul 19:16
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Jul 19:16
comments (0)
ArkScript, A small, lisp-inspired, functional scripting language
(arkscript-lang.dev)
in programming@programming.dev from SuperFola@programming.dev on 25 Jul 17:38
comments (10)
in programming@programming.dev from SuperFola@programming.dev on 25 Jul 17:38
comments (10)
Hackers—hope to defect to Russia? Don’t Google “defecting to Russia.”
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 25 Jul 01:43
comments (16)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 25 Jul 01:43
comments (16)
A valid HTML zip bomb
(ache.one)
in programming@programming.dev from Pro@programming.dev on 24 Jul 23:26
comments (4)
in programming@programming.dev from Pro@programming.dev on 24 Jul 23:26
comments (4)
koto v0.16.0 released (koto is a scripting programming language)
(github.com)
in programming@programming.dev from BB_C@programming.dev on 24 Jul 07:49
comments (4)
in programming@programming.dev from BB_C@programming.dev on 24 Jul 07:49
comments (4)
Authorities in Ukraine nab alleged admin of Russian-language cybercrime forum | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:26
comments (0)
Trump AI plan pushes critical infrastructure to use AI for cyber defense | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:17
comments (14)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:17
comments (14)
Coyote in the Wild: First-Ever Malware That Abuses UI Automation | Akamai
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:10
comments (0)
Operation Cargotalon: Ung0901 Targets Russian Aerospace Defense Using Eaglet Implant
(www.seqrite.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:02
comments (0)