programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
State-Provided Software Helped Stop Cyber Attack in Texas
(www.govtech.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 06 Dec 00:17
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 06 Dec 00:17
comments (0)
Supporting the Future of Rust: Spotlight on Teaching Initiatives
(foundation.rust-lang.org)
in rust@programming.dev from BrikoX@lemmy.zip on 05 Dec 22:53
comments (0)
in rust@programming.dev from BrikoX@lemmy.zip on 05 Dec 22:53
comments (0)
Solana SDK backdoored to steal secrets, private keys
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (2)
'Earth Minotaur' Exploits WeChat, Sends Spyware to Uyghurs
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Dec 16:41
comments (0)
Backdoor slips into popular code library, drains ~$155k from digital wallets
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 05 Dec 16:04
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 05 Dec 16:04
comments (1)
Launching the 2024 State of Rust Survey
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 05 Dec 15:14
comments (0)
in rust@programming.dev from neme@lemm.ee on 05 Dec 15:14
comments (0)
Cisco NX-OS Flaw Let Attackers Bypass Image Signature Verification
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 13:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 13:51
comments (0)
Ukraine’s DDoS attack cripples Russia’s Gazprombank
(english.nv.ua)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:34
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:34
comments (1)
Deepfake Fraud: How AI is Bypassing Biometric Security in Financial Institutions
(www.group-ib.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:33
comments (0)
83% of organizations reported insider attacks in 2024
(securityintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:30
comments (1)
New DroidBot Android malware targets 77 banking, crypto apps
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:19
comments (0)
Massive breach exposes major USAID contractor
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 12:17
comments (0)
T-Mobile US CSO: Spies jumped from one telco to another in a way "I've not seen in my career"
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 05 Dec 01:53
comments (4)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 05 Dec 01:53
comments (4)
FBI Warns Americans to Start Using Encrypted Messaging Apps
(gizmodo.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 00:00
comments (38)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Dec 00:00
comments (38)
How to run current file in Kate?
in programming@programming.dev from unknown1234_5@kbin.earth on 04 Dec 20:12
comments (37)
in programming@programming.dev from unknown1234_5@kbin.earth on 04 Dec 20:12
comments (37)
~ Code Crafters Cafe ~
in programming@programming.dev from modev@snac.bsd.cafe on 04 Dec 19:58
comments (4)
in programming@programming.dev from modev@snac.bsd.cafe on 04 Dec 19:58
comments (4)
Deloitte UK Hacked - Brain Cipher Group Claim to Have Stolen 1 TB of Data
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 19:16
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 19:16
comments (6)
BT unit took servers offline after Black Basta ransomware breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 19:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 19:16
comments (0)
NHS Ransomware Attack: Russian INC Ransom Gang Steals Patient Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 17:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 17:55
comments (0)
Russian hackers hijack Pakistani hackers' servers for their own attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 17:54
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 17:54
comments (1)
New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 15:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 15:38
comments (0)
10/10 directory traversal bug hits SailPoint's IdentityIQ
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:06
comments (0)
Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:05
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:05
comments (2)
Cloudflare’s developer domains increasingly abused by threat actors
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:03
comments (0)
CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:02
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:02
comments (1)
Vodka maker Stoli files for bankruptcy in US after ransomware attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:02
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 12:02
comments (5)
BreakingWAF: Widespread WAF Bypass Impacts Nearly 40% of Fortune 100 companies
(www.zafran.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 00:16
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Dec 00:16
comments (5)
Programming with metal, or metal with programming?
(www.youtube.com)
in programming@programming.dev from Olap@lemmy.world on 03 Dec 22:27
comments (7)
in programming@programming.dev from Olap@lemmy.world on 03 Dec 22:27
comments (7)
North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 18:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 18:58
comments (0)
Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 17:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 17:40
comments (0)
No more punched tape and CDs? NCSC promises progress on £2.6 billion cryptographic key overhaul
(www.thestack.technology)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Dec 17:00
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Dec 17:00
comments (0)
Police seize Matrix (not matrix.org) encrypted chat service after spying on criminals
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Dec 16:49
comments (6)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Dec 16:49
comments (6)
Apple espionage on its employees iPhones and iCloud accounts
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 16:14
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 16:14
comments (5)
International operation takes down another encrypted messaging service used by criminals | Europol
(www.europol.europa.eu)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 03 Dec 15:54
comments (5)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 03 Dec 15:54
comments (5)
The shocking speed of AWS key exploitation - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:17
comments (0)
Salesforce Applications Vulnerability Could Allow Full Account Takeover
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:14
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:14
comments (1)
UK Ministry of Defense MoD passwords leaked on Dark Web - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:13
comments (0)
Cisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Software
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:11
comments (0)
Korea arrests CEO for adding DDoS feature to satellite receivers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:08
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Dec 12:08
comments (2)
would you help me with this
in programming@programming.dev from phpinjected@lemmy.sdf.org on 03 Dec 11:33
comments (6)
in programming@programming.dev from phpinjected@lemmy.sdf.org on 03 Dec 11:33
comments (6)
In GPU We Rust (talk)
(vimeo.com)
in rust@programming.dev from kvark@programming.dev on 03 Dec 06:25
comments (0)
in rust@programming.dev from kvark@programming.dev on 03 Dec 06:25
comments (0)
Minecraft Mod written in Rust
(github.com)
in rust@lemmy.ml from qaz@lemmy.world on 02 Dec 07:13
comments (0)
dupe: rust@programming.dev (0)
dupe: programming@programming.dev (0)
in rust@lemmy.ml from qaz@lemmy.world on 02 Dec 07:13
comments (0)
dupe: rust@programming.dev (0)
dupe: programming@programming.dev (0)
Humble Tech Book Bundle: Hacking 2024 by No Starch
(www.humblebundle.com)
in programming@programming.dev from SmartmanApps@programming.dev on 03 Dec 02:35
comments (0)
in programming@programming.dev from SmartmanApps@programming.dev on 03 Dec 02:35
comments (0)
Why Learning to Code is So Damn Hard
(web.archive.org)
in programming@programming.dev from DollyDuller@programming.dev on 02 Dec 16:43
comments (45)
in programming@programming.dev from DollyDuller@programming.dev on 02 Dec 16:43
comments (45)
Microsoft Boosts Device Security With Windows Resiliency Initiative
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 14:24
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 14:24
comments (2)
8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:28
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:28
comments (1)
Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:26
comments (0)
New Windows Server 2012 zero-day gets free, unofficial patches
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:25
comments (1)
Novel phising campaign uses corrupted Word documents to evade security
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:24
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Dec 11:24
comments (2)
Should I Create A Rust or C Wikibook?
in programming@programming.dev from Lofenyy@sh.itjust.works on 01 Dec 21:54
comments (8)
in programming@programming.dev from Lofenyy@sh.itjust.works on 01 Dec 21:54
comments (8)
I made a little tool to unzip archives in a sane way
(github.com)
in programming@programming.dev from myxi@toast.ooo on 01 Dec 13:56
comments (12)
in programming@programming.dev from myxi@toast.ooo on 01 Dec 13:56
comments (12)
Any data scientists out there? What's your go to programming language and tools for your work?
in programming@programming.dev from rutrum@lm.paradisus.day on 01 Dec 12:28
comments (30)
in programming@programming.dev from rutrum@lm.paradisus.day on 01 Dec 12:28
comments (30)
Advent of Code 2024
(adventofcode.com)
in programming@programming.dev from clot27@lemm.ee on 01 Dec 10:24
comments (1)
in programming@programming.dev from clot27@lemm.ee on 01 Dec 10:24
comments (1)
How could digitial age verification be possibly implemented with privacy in mind?
in programming@programming.dev from onlinepersona@programming.dev on 30 Nov 19:51
comments (85)
in programming@programming.dev from onlinepersona@programming.dev on 30 Nov 19:51
comments (85)
What Framework do you recommend for webdev?
in rust@lemmy.ml from ClusterBomb@lemmy.blahaj.zone on 30 Nov 11:51
comments (0)
in rust@lemmy.ml from ClusterBomb@lemmy.blahaj.zone on 30 Nov 11:51
comments (0)
rustc_codegen_gcc: Progress Report #34
(blog.antoyo.xyz)
in rust@programming.dev from antoyo@programming.dev on 30 Nov 16:24
comments (2)
in rust@programming.dev from antoyo@programming.dev on 30 Nov 16:24
comments (2)
Lab401 black friday / cyber monday sale with hamster hunt
in cybersecurity@sh.itjust.works from taaz@biglemmowski.win on 29 Nov 21:26
comments (0)
in cybersecurity@sh.itjust.works from taaz@biglemmowski.win on 29 Nov 21:26
comments (0)
Why isn't libcurl doing anything?
in programming@programming.dev from Irelephant@lemm.ee on 29 Nov 20:13
comments (17)
in programming@programming.dev from Irelephant@lemm.ee on 29 Nov 20:13
comments (17)
Zabbix urges upgrades after SQL injection bug disclosure • The Register
(go.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Nov 19:45
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Nov 19:45
comments (3)
Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Nov 16:54
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Nov 16:54
comments (3)
Goodbye, Rust. I wish you success but I'm back to C++ (sorry, it is a rant)
(old.reddit.com)
in rust@programming.dev from BitSound@lemmy.world on 29 Nov 16:38
comments (27)
in rust@programming.dev from BitSound@lemmy.world on 29 Nov 16:38
comments (27)
Ransomware spreading through Microsoft Teams - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Nov 13:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Nov 13:26
comments (1)
Mini Macro Pad v2 - Now you can edit your Macros in the GUI.
(github.com)
in golang@programming.dev from DichotoDeezNutz@lemmy.world on 28 Nov 20:21
comments (0)
dupe: programming@programming.dev (7)
in golang@programming.dev from DichotoDeezNutz@lemmy.world on 28 Nov 20:21
comments (0)
dupe: programming@programming.dev (7)
Announcing Rust 1.83.0
(blog.rust-lang.org)
in rust@programming.dev from snaggen@programming.dev on 28 Nov 18:56
comments (2)
in rust@programming.dev from snaggen@programming.dev on 28 Nov 18:56
comments (2)
Mimic Ransomware: What You Need To Know
(www.tripwire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 16:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 16:50
comments (0)
Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 14:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 14:51
comments (0)
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropbox
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 14:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 14:50
comments (0)
40-year-old hacker group prefers Rust
(blog.rust.careers)
in rust@programming.dev from snaggen@programming.dev on 28 Nov 12:14
comments (9)
in rust@programming.dev from snaggen@programming.dev on 28 Nov 12:14
comments (9)
Zello asks users to reset passwords after security incident
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 11:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 11:28
comments (0)
Attack Group APT-C-60 Targets Japan Using Trusted Platforms
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 11:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 11:10
comments (0)
Pro-Russian Hacktivists Launch Branded Ransomware Operations
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 11:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Nov 11:09
comments (0)
Rust 2024 call for testing | Rust Blog
(blog.rust-lang.org)
in rust@programming.dev from snaggen@programming.dev on 28 Nov 08:50
comments (0)
in rust@programming.dev from snaggen@programming.dev on 28 Nov 08:50
comments (0)
Hackers abuse popular Godot game engine to infect thousands of PCs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Nov 03:32
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Nov 03:32
comments (2)
Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Nov 03:29
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Nov 03:29
comments (1)
Salt Typhoon’s cyberstorm reaches beyond US telcos
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 Nov 01:24
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 Nov 01:24
comments (0)
A Brief, Incomplete, and Mostly Wrong History of Programming Languages
(james-iry.blogspot.com)
in programming@programming.dev from troyunrau@lemmy.ca on 27 Nov 19:54
comments (10)
in programming@programming.dev from troyunrau@lemmy.ca on 27 Nov 19:54
comments (10)
Researchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernels
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Nov 19:53
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Nov 19:53
comments (4)
Data broker leaves 600K+ sensitive files exposed online
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 27 Nov 18:21
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 27 Nov 18:21
comments (0)
Deno v. Oracle: Canceling the JavaScript Trademark
(deno.com)
in programming@programming.dev from Kissaki@programming.dev on 27 Nov 14:36
comments (9)
in programming@programming.dev from Kissaki@programming.dev on 27 Nov 14:36
comments (9)
Good Projects for People Getting Started in Cybersec
in cybersecurity@sh.itjust.works from gwilikers@lemmy.ml on 27 Nov 13:04
comments (3)
in cybersecurity@sh.itjust.works from gwilikers@lemmy.ml on 27 Nov 13:04
comments (3)
Patients sent home after cyberattack hits UK hospitals
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Nov 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Nov 11:49
comments (0)
Runtime Const Generics
in rust@lemmy.ml from raldone01@lemmy.world on 26 Nov 08:45
comments (0)
in rust@lemmy.ml from raldone01@lemmy.world on 26 Nov 08:45
comments (0)
Starbucks operations hit after ransomware attack on supply chain software vendor
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 26 Nov 21:17
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 26 Nov 21:17
comments (0)
The Bing Wallpaper app may decrypt, read your cookies
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 19:07
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 19:07
comments (6)
'Matrix' Hackers Deploy Massive New IoT Botnet for DDoS Attacks
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 19:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 19:03
comments (0)
How to start an open source gaming project?
in programming@programming.dev from cm0002@lemmy.world on 26 Nov 17:30
comments (15)
in programming@programming.dev from cm0002@lemmy.world on 26 Nov 17:30
comments (15)
US senators propose mandated MFA, encryption in healthcare
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 26 Nov 17:09
comments (9)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 26 Nov 17:09
comments (9)
Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 13:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 13:50
comments (0)
The source code of Banshee Stealer leaked online
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 13:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 13:50
comments (0)
Firefox and Windows zero-days exploited by Russian RomCom hackers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 13:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 13:20
comments (0)
minivault - granular credentials store in Rust
(codeberg.org)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 26 Nov 12:06
comments (0)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 26 Nov 12:06
comments (0)
7-Zip RCE Vulnerability Let Attackers Execute Remote Code
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:33
comments (2)
XSS Vulnerability in bing.com Let Attackers Send Crafted Malicious Requests
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:22
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:22
comments (1)
IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:21
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:21
comments (0)
Palo Alto Networks Warns of GlobalProtect App Flaw with Public Exploit Code (CVE-2024-5921)
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:18
comments (0)
DOJ: Man hacked networks to pitch cybersecurity services
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:18
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 11:18
comments (1)
Salt Typhoon hackers backdoor telcos with new GhostSpider malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 10:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 10:49
comments (0)
Blue Yonder Ransomware Attack Hits Starbucks, Supermarkets
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 10:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Nov 10:48
comments (1)
Writing Composable SQL using Knex and Pipelines
(lackofimagination.org)
in programming@programming.dev from Aijan@programming.dev on 26 Nov 10:05
comments (7)
in programming@programming.dev from Aijan@programming.dev on 26 Nov 10:05
comments (7)
Australia’s first Cyber Security Act passes both houses
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 26 Nov 02:39
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 26 Nov 02:39
comments (0)
Where Y.A.G.N.I. falls short
(www.rhyous.com)
in programming@programming.dev from BlueSerendipity8@programming.dev on 25 Nov 21:17
comments (10)
in programming@programming.dev from BlueSerendipity8@programming.dev on 25 Nov 21:17
comments (10)
I always feel better about myself when I see huge companies pull off shit like this
in programming@programming.dev from rikudou@lemmings.world on 25 Nov 18:45
comments (22)
in programming@programming.dev from rikudou@lemmings.world on 25 Nov 18:45
comments (22)
Private videoconferencing ?
in cybersecurity@sh.itjust.works from Gordon_F@lemmy.ml on 25 Nov 17:22
comments (3)
in cybersecurity@sh.itjust.works from Gordon_F@lemmy.ml on 25 Nov 17:22
comments (3)
Forget "gif" vs "jif" debate. How does one pronounce "Forgejo"?
in programming@programming.dev from Justas@sh.itjust.works on 25 Nov 15:03
comments (53)
in programming@programming.dev from Justas@sh.itjust.works on 25 Nov 15:03
comments (53)
Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated
(www.darkreading.com)
in cybersecurity@sh.itjust.works from Mindwolf@lemm.ee on 25 Nov 13:52
comments (7)
in cybersecurity@sh.itjust.works from Mindwolf@lemm.ee on 25 Nov 13:52
comments (7)
Chinese hackers preparing for conflict, US cyber official says
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Nov 13:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Nov 13:12
comments (0)
Hackers abuse Avast anti-rootkit driver to disable defenses
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Nov 13:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Nov 13:11
comments (0)
Gitoxide Update November 2024
(github.com)
in rust@programming.dev from snaggen@programming.dev on 25 Nov 08:57
comments (0)
in rust@programming.dev from snaggen@programming.dev on 25 Nov 08:57
comments (0)
Is it recommended to use a Rust virtual environment when installing programs with cargo?
in rust@lemmy.ml from dontblink@feddit.it on 23 Nov 11:13
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 23 Nov 11:13
comments (0)
The Technology the Trump Administration Could Use to Hack Your Phone
(www.newyorker.com)
in cybersecurity@sh.itjust.works from jaromil@fed.dyne.org on 23 Nov 06:50
comments (6)
in cybersecurity@sh.itjust.works from jaromil@fed.dyne.org on 23 Nov 06:50
comments (6)
China Wiretaps Americans in 'Worst Hack in Our Nation's History'
(gizmodo.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Nov 02:28
comments (4)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Nov 02:28
comments (4)
All Our Aggregates Are Wrong - Mauro Servienti
(www.youtube.com)
in programming@programming.dev from BlueSerendipity8@programming.dev on 22 Nov 23:20
comments (0)
in programming@programming.dev from BlueSerendipity8@programming.dev on 22 Nov 23:20
comments (0)
Five Ransomware Groups Responsible for 40% of Cyber-Attacks in 2024
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:32
comments (0)
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:30
comments (0)
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
(www.wired.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 22 Nov 13:48
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 22 Nov 13:48
comments (6)
'Water Barghest' Sells Hijacked IoT Devices for Proxy Botnet Misuse
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (1)
US military officials used China-linked promotional gift shop GS-JJ, exposing over 300K emails
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (4)
Apple Admits to Security Vulnerability That Leaves Crypto Users Exposed—Here's What You Should Do - Decrypt
(decrypt.co)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 22 Nov 09:37
comments (1)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 22 Nov 09:37
comments (1)
Looking for Mentor (for a PhD Candidate) that works with open source and Rust
in rust@lemmy.ml from thevoidzero@lemmy.world on 21 Nov 05:27
comments (0)
in rust@lemmy.ml from thevoidzero@lemmy.world on 21 Nov 05:27
comments (0)
Re-thinking the Visitor Pattern with the Double-Dispatch Approach
(exceptionnotfound.net)
in programming@programming.dev from BlueSerendipity8@programming.dev on 21 Nov 22:35
comments (1)
in programming@programming.dev from BlueSerendipity8@programming.dev on 21 Nov 22:35
comments (1)
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:09
comments (0)
2,000 Palo Alto Networks devices compromised in latest attacks
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:07
comments (0)
Helldown Ransomware Attacking VMware ESX And Linux Servers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:06
comments (0)
Practices of Reliable Software Design
(entropicthoughts.com)
in programming@programming.dev from learnbyexample@programming.dev on 21 Nov 13:48
comments (2)
in programming@programming.dev from learnbyexample@programming.dev on 21 Nov 13:48
comments (2)
MITRE shares 2024's top 25 most dangerous software weaknesses
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:57
comments (0)
China's Liminal Panda APT Attacks Telcos, Steals Data
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:55
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:55
comments (2)
Ransomware Gangs Evolve: They're Now Recruiting Penetration Testers
(blog.knowbe4.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:52
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:52
comments (2)
Ubuntu affected by 10-year-old flaws in needrestart package
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
Cyberattack at French hospital exposes health data of 750,000 patients
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
US and UK Military Social Network "Forces Penpals" Exposes SSN, PII Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:45
comments (0)
Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
(thehackernews.com)
in programming@programming.dev from unknowing8343@discuss.tchncs.de on 21 Nov 11:45
comments (2)
in programming@programming.dev from unknowing8343@discuss.tchncs.de on 21 Nov 11:45
comments (2)
D-Link says replace vulnerable routers or risk pwnage
(www.theregister.com)
in cybersecurity@sh.itjust.works from cron@feddit.org on 21 Nov 08:28
comments (2)
in cybersecurity@sh.itjust.works from cron@feddit.org on 21 Nov 08:28
comments (2)
Humble Tech Book Bundle: Math for Programmers 2024 by Manning
(www.humblebundle.com)
in programming@programming.dev from SmartmanApps@programming.dev on 21 Nov 05:11
comments (20)
in programming@programming.dev from SmartmanApps@programming.dev on 21 Nov 05:11
comments (20)
BianLian group based in Russia, is moving from ransomware attacks to extortion.
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 21 Nov 01:34
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 21 Nov 01:34
comments (0)
Simple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systems
(arxiv.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 23:27
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 23:27
comments (0)
You’re not as loosely coupled as you think!
(codeopinion.com)
in programming@programming.dev from BlueSerendipity8@programming.dev on 20 Nov 19:56
comments (8)
in programming@programming.dev from BlueSerendipity8@programming.dev on 20 Nov 19:56
comments (8)
5 Defendants Charged Federally with Running Scheme that Targeted Victim Companies via Phishing Text Messages
(www.justice.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 19:51
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 19:51
comments (0)
A Shiny New Programming Language - Hackster.io
(www.hackster.io)
in programming@programming.dev from 0x0@programming.dev on 20 Nov 17:37
comments (16)
in programming@programming.dev from 0x0@programming.dev on 20 Nov 17:37
comments (16)
“Sad announcement” email leads to tech support scam
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:02
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:02
comments (0)
Adversaries Abuse Microsoft Teams and Quick Assist
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:00
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:00
comments (0)
How Did REST Come To Mean The Opposite of REST? | htmx
(htmx.org)
in programming@programming.dev from Kissaki@programming.dev on 20 Nov 12:29
comments (18)
in programming@programming.dev from Kissaki@programming.dev on 20 Nov 12:29
comments (18)
Ghost Tap: New cash-out tactic with NFC Relay
(www.threatfabric.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 12:02
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 12:02
comments (0)
Malicious QR codes
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:42
comments (5)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:42
comments (5)
Threat assessment: Ignoble Scorpius, distributors of BlackSuit ransomware
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:40
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:40
comments (0)
On "Safe" C++
(izzys.casa)
in programming@programming.dev from LearnedDonkey@kbin.earth on 20 Nov 09:13
comments (29)
in programming@programming.dev from LearnedDonkey@kbin.earth on 20 Nov 09:13
comments (29)
FLTK 1.4 Released With Wayland & HiDPI Display Support on Phoronix (19 Nov 2024)
(www.phoronix.com)
in programming@programming.dev from thingsiplay@beehaw.org on 20 Nov 05:42
comments (0)
in programming@programming.dev from thingsiplay@beehaw.org on 20 Nov 05:42
comments (0)
Fintech Giant Finastra Investigating Data Breach
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:43
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:43
comments (1)
Fighting cybercrime is no hack job
(360info.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:33
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:33
comments (0)
Cybercrime-as-a-service: the industry behind online attacks
(360info.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:28
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:28
comments (0)
Apple Fixes Two Exploited Vulnerabilities
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 00:11
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 00:11
comments (0)
TSA Is Taking Steps to Enhance Cybersecurity, but Additional Actions Are Needed
(www.gao.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 23:14
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 23:14
comments (0)
[newbie] Can I specify what subset of errors a function can return?
in rust@lemmy.ml from gomp@lemmy.ml on 19 Nov 16:29
comments (0)
in rust@lemmy.ml from gomp@lemmy.ml on 19 Nov 16:29
comments (0)
Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence
(cloud.google.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:31
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:31
comments (0)
Free AI editor lures in victims, installs information stealer instead on Windows and Mac
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:29
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:29
comments (0)
Gen Q3/2024 Threat Report
(www.gendigital.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:14
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:14
comments (0)
Library of Congress' Email System Compromised for Nine Months by Unknown Hackers
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:29
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:29
comments (0)
A Study of Malware Prevention in Linux Distributions
(arxiv.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:10
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:10
comments (1)
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (2)
Ford 'actively investigating' breach claims
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (0)
Recently disclosed VMware vCenter Server bugs are actively exploited in attacks
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:47
comments (0)
Apache Kafka Vulnerability Let Attackers Escalate Privileges
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:44
comments (0)
Ransomware Attack on Oklahoma Medical Center Impacts 133,000
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
Space tech giant Maxar confirms hacker accessed employees' personal data
(techcrunch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
Akira Ransomware Racks Up 30+ Victims in a Single Day
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:46
comments (1)
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:44
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:44
comments (0)
Helldown Ransomware: an overview of this emerging threat
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:08
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:08
comments (0)
Kaspersky online shopping threat report 2024
(securelist.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 10:13
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 10:13
comments (0)
The Thirty Million Line Problem
(www.youtube.com)
in programming@programming.dev from agilob@programming.dev on 19 Nov 07:22
comments (7)
in programming@programming.dev from agilob@programming.dev on 19 Nov 07:22
comments (7)
What do you code in Rust?
in rust@lemmy.ml from ClusterBomb@lemmy.blahaj.zone on 18 Nov 11:01
comments (0)
in rust@lemmy.ml from ClusterBomb@lemmy.blahaj.zone on 18 Nov 11:01
comments (0)
AI company tells SEC that $250,000 stolen in cyberattack
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 22:18
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 22:18
comments (0)
Babble Babble Babble Babble Babble Babble BabbleLoader
(intezer.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:34
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:34
comments (1)
Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime Charges
(www.justice.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:21
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:21
comments (0)
Simultaneously resettable zero knowledge protocol in Public Key model
(cybersecurity.springeropen.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:17
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:17
comments (1)
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
(www.proofpoint.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:11
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:11
comments (1)
Let's Encrypt is 10 years old today !
(letsencrypt.org)
in cybersecurity@sh.itjust.works from pcouy@lemmy.pierre-couy.fr on 18 Nov 19:15
comments (4)
in cybersecurity@sh.itjust.works from pcouy@lemmy.pierre-couy.fr on 18 Nov 19:15
comments (4)
Fortra Reports Alarming Increase In Abuse Of Cloudflare Services
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:30
comments (0)
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:22
comments (0)
QuickBooks popup scam still being delivered via Google ads
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:54
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:54
comments (0)
Inside Bitdefender Labs’ Investigation of a Malicious Facebook Ad Campaign Targeting Bitwarden Users
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:26
comments (3)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:26
comments (3)
British software company Microlise confirms hackers compromised corporate data
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 16:19
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 16:19
comments (0)
Security Update - Release 1.32.5 · dani-garcia/vaultwarden
(github.com)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 18 Nov 13:25
comments (1)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 18 Nov 13:25
comments (1)
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:46
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:46
comments (4)
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:42
comments (0)
Zero-Day Exploitation Targeting Palo Alto Networks Firewall
(www.rapid7.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:40
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:40
comments (1)
I made a FOSS AI file organizer!
(github.com)
in programming@programming.dev from justzvan@lemmy.ml on 18 Nov 11:35
comments (19)
in programming@programming.dev from justzvan@lemmy.ml on 18 Nov 11:35
comments (19)
Baby unit tests
(johan.hal.se)
in programming@programming.dev from rglullis@communick.news on 18 Nov 09:32
comments (16)
in programming@programming.dev from rglullis@communick.news on 18 Nov 09:32
comments (16)
Exploit attempts for unpatched Citrix vulnerability
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 07:26
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 07:26
comments (0)
Phishing emails increasingly use SVG attachments to evade detection
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (2)
Security plugin flaw in millions of WordPress sites gives admin access
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (1)
CSS Gets a New Logo: And It Uses the Color `rebeccapurple`
(michaelcharl.es)
in programming@programming.dev from popcar2@programming.dev on 17 Nov 13:37
comments (12)
in programming@programming.dev from popcar2@programming.dev on 17 Nov 13:37
comments (12)
Ancient TP-Link Backdoor Discovered by Attackers
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 17 Nov 09:22
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 17 Nov 09:22
comments (1)
RIP Thomas Kurtz
(hackaday.com)
in programming@programming.dev from sjpwarren@programming.dev on 16 Nov 23:53
comments (4)
in programming@programming.dev from sjpwarren@programming.dev on 16 Nov 23:53
comments (4)
How to define / edit a struct istance field with a method?
in rust@lemmy.ml from dontblink@feddit.it on 15 Nov 11:35
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 15 Nov 11:35
comments (0)
Simple Include Statement Hides Casino Spam
(blog.sucuri.net)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 12:59
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 12:59
comments (0)