programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Kash Patel Is Already Making Huge Changes at the FBI
(pjmedia.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 23 Feb 05:18
comments (2)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 23 Feb 05:18
comments (2)
FFMPEG Assembly Language Lessons
(github.com)
in programming@programming.dev from mox@lemmy.sdf.org on 22 Feb 21:38
comments (0)
in programming@programming.dev from mox@lemmy.sdf.org on 22 Feb 21:38
comments (0)
A Web-Based Graphics Editor For Tiny Screens
(hackaday.com)
in programming@programming.dev from cm0002@lemmy.world on 22 Feb 20:59
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 22 Feb 20:59
comments (1)
Release: progrs v0.0.1
(github.com)
in rust@programming.dev from KillTheMule@programming.dev on 22 Feb 15:49
comments (1)
in rust@programming.dev from KillTheMule@programming.dev on 22 Feb 15:49
comments (1)
Fedora lead doesn't get Flathub, Torvalds solves Rust debate, Cosmic a6: Linux & Open Source
(tilvids.com)
in rust@programming.dev from recursive_recursion@lemmy.ca on 22 Feb 14:43
comments (0)
in rust@programming.dev from recursive_recursion@lemmy.ca on 22 Feb 14:43
comments (0)
Do-nothing scripting: the key to gradual automation
(blog.danslimmon.com)
in programming@programming.dev from learnbyexample@programming.dev on 22 Feb 11:01
comments (14)
in programming@programming.dev from learnbyexample@programming.dev on 22 Feb 11:01
comments (14)
[Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.
(openai.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 21 Feb 20:20
comments (1)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 21 Feb 20:20
comments (1)
DeceptiveDevelopment targets freelance developers.
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 21 Feb 19:07
comments (0)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 21 Feb 19:07
comments (0)
Pythonx: A Python interpreter for Elixir
(github.com)
in programming@programming.dev from sirico@feddit.uk on 21 Feb 16:22
comments (1)
in programming@programming.dev from sirico@feddit.uk on 21 Feb 16:22
comments (1)
Europol Cracks Down on European Document Forgery and Smuggling Ring
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 13:25
comments (0)
DeepSeek found to be sharing user data with TikTok parent company ByteDance
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 13:22
comments (28)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 13:22
comments (28)
Atlassian fixed critical flaws in Confluence and Crowd
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 13:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 13:22
comments (0)
Pegasus Spyware Used Widely to Target Individuals in Private Industry & Finance Sectors
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:37
comments (0)
Cyber Threat Actors Leveraging Exploits To Attack Financial Sector With Advanced Malware
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:37
comments (0)
Chinese hackers use custom malware to spy on US telecom networks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:29
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:29
comments (2)
Black Basta ransomware gang's internal chat logs leak online
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:28
comments (0)
Over 1.6 million records from clinical trial database exposed
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:26
comments (0)
Malware hides on Google docs: passwords and private chats at risk
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Feb 12:26
comments (0)
New wave of targeted attacks of the Angry Likho APT on Russian organizations.
(securelist.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 21 Feb 10:29
comments (0)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 21 Feb 10:29
comments (0)
To people making shitty guides/tutorials.
in programming@programming.dev from Emmie@lemm.ee on 21 Feb 08:32
comments (43)
in programming@programming.dev from Emmie@lemm.ee on 21 Feb 08:32
comments (43)
When Your Last Name Is Null, Nothing Works
(www.wsj.com)
in programming@programming.dev from otter@lemmy.ca on 21 Feb 06:54
comments (33)
in programming@programming.dev from otter@lemmy.ca on 21 Feb 06:54
comments (33)
Linus sets his foot down, against the gatekeeping attempts in the kernel
(lore.kernel.org)
in rust@programming.dev from snaggen@programming.dev on 21 Feb 06:33
comments (41)
in rust@programming.dev from snaggen@programming.dev on 21 Feb 06:33
comments (41)
Announcing Rust 1.85.0 and Rust 2024
(blog.rust-lang.org)
in rust@lemmy.ml from Ephera@lemmy.ml on 20 Feb 20:30
comments (0)
dupe: rust@programming.dev (7)
dupe: programming@programming.dev (9)
in rust@lemmy.ml from Ephera@lemmy.ml on 20 Feb 20:30
comments (0)
dupe: rust@programming.dev (7)
dupe: programming@programming.dev (9)
Let's try GitHub Copilot Agent mode to build a FULL app!
(www.youtube.com)
in programming@programming.dev from SmartmanApps@programming.dev on 21 Feb 00:43
comments (0)
in programming@programming.dev from SmartmanApps@programming.dev on 21 Feb 00:43
comments (0)
Russian hackers target Signal accounts in growing espionage effort
(kyivindependent.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 20 Feb 22:39
comments (3)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 20 Feb 22:39
comments (3)
Two critical vulnerabilities lead to stolen MongoDB data, RCE
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 20 Feb 15:32
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 20 Feb 15:32
comments (0)
Beverly Hills Plastic Surgeon Sued for Not Telling Patients Hackers Stole Their Nude Photos
(www.404media.co)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 20 Feb 15:27
comments (7)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 20 Feb 15:27
comments (7)
Weathering the storm: In the midst of a Typhoon.
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 20 Feb 15:22
comments (0)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 20 Feb 15:22
comments (0)
DOGE Now Has Access to the Top US Cybersecurity Agency
(www.wired.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 20 Feb 15:05
comments (13)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 20 Feb 15:05
comments (13)
Medusa extortion gang demands $2M from UK's HCRG Care Group
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:32
comments (0)
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:31
comments (0)
Zero-Day Security Flaw in Microsoft Power Pages (CVE-2025-24989) Exposes Users to Privilege Escalation
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:29
comments (0)
Darcula PhaaS can now auto-generate phishing kits for any brand
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:11
comments (0)
Cybercriminals shift focus to social media as attacks reach historic highs
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:10
comments (0)
CISA and FBI: Ghost ransomware breached orgs in 70 countries
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Feb 12:10
comments (0)
I have created my Portfolio site as a computer underGrad. Please rate / roast it.
(shaswat.software)
in programming@programming.dev from palmtrees2309@lemm.ee on 20 Feb 09:38
comments (14)
in programming@programming.dev from palmtrees2309@lemm.ee on 20 Feb 09:38
comments (14)
How to scan PDF files for malware?
in cybersecurity@sh.itjust.works from blackberry@midwest.social on 19 Feb 23:47
comments (6)
in cybersecurity@sh.itjust.works from blackberry@midwest.social on 19 Feb 23:47
comments (6)
"A calculator app? Anyone could make that."
(chadnauseam.com)
in programming@programming.dev from Occhioverde@feddit.it on 19 Feb 20:56
comments (7)
dupe: inks@inks.tedunangst.com (0)
in programming@programming.dev from Occhioverde@feddit.it on 19 Feb 20:56
comments (7)
dupe: inks@inks.tedunangst.com (0)
Typst 0.13 released
(typst.app)
in rust@programming.dev from KillTheMule@programming.dev on 19 Feb 19:46
comments (8)
in rust@programming.dev from KillTheMule@programming.dev on 19 Feb 19:46
comments (8)
Ghost (Cring) Ransomware.
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 19 Feb 19:34
comments (0)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 19 Feb 19:34
comments (0)
Australian IVF giant Genea confirms hackers 'accessed data' during cyberattack
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 19 Feb 17:12
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 19 Feb 17:12
comments (0)
Google now allows digital fingerprinting of its users
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 16:58
comments (44)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 16:58
comments (44)
How do I use the `-wl,` argument in Powershell?
in programming@programming.dev from ZILtoid1991@lemmy.world on 19 Feb 16:53
comments (2)
in programming@programming.dev from ZILtoid1991@lemmy.world on 19 Feb 16:53
comments (2)
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger.
(cloud.google.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 19 Feb 12:50
comments (1)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 19 Feb 12:50
comments (1)
North Korea's Kimsuky Attacks Rivals' Trusted Platforms
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:07
comments (0)
Hard drives containing sensitive medical data found in flea market
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:04
comments (19)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:04
comments (19)
New XELERA Ransomware Campaign Spreading Through Malicious Documents
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:02
comments (0)
Anonymous VPS Provider BitLaunch Under Fire for Facilitating Ransomware Attacks
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 12:00
comments (0)
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:59
comments (0)
Critical Flaw in Apache Ignite (CVE-2024-52577) Allows Attackers to Execute Code Remotely
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:59
comments (0)
New FrigidStealer Malware Targets macOS Users via Fake Browser Updates
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:59
comments (0)
Debunking the AI Hype: Inside Real Hacker Tactics
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:58
comments (0)
VC giant Insight Partners confirms January cyberattack | TechCrunch
(techcrunch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:57
comments (0)
Infostealers target major US defense contractors, military personnel
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Feb 11:56
comments (0)
How Phished Data Turns into Apple & Google Wallets.
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 19 Feb 08:32
comments (0)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 19 Feb 08:32
comments (0)
More discussions on LKML about rust
(www.phoronix.com)
in rust@programming.dev from snaggen@programming.dev on 19 Feb 07:59
comments (13)
in rust@programming.dev from snaggen@programming.dev on 19 Feb 07:59
comments (13)
Palo Alto warns firewalls flaws are under active attack
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 19 Feb 02:29
comments (4)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 19 Feb 02:29
comments (4)
Time to make C the COBOL of this century
(www.theregister.com)
in programming@programming.dev from cm0002@lemmy.world on 18 Feb 21:26
comments (40)
in programming@programming.dev from cm0002@lemmy.world on 18 Feb 21:26
comments (40)
China-linked APT group Winnti targets Japanese organizations
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 17:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 17:48
comments (0)
New OpenSSH flaws expose SSH servers to MiTM and DoS attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 17:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 17:33
comments (2)
Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:54
comments (0)
Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:47
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:47
comments (2)
Juniper Issues Warning About Critical Authentication Bypass Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:47
comments (0)
New Windows Zero-Day Exploited by Chinese APT: Security Firm
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Feb 12:30
comments (1)
StaryDobry campaign targets gamers with XMRig miner.
(securelist.com)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 18 Feb 11:25
comments (5)
in cybersecurity@sh.itjust.works from Cat@ponder.cat on 18 Feb 11:25
comments (5)
How to know what links are malicious on Lemmy?
in cybersecurity@sh.itjust.works from blackberry@midwest.social on 18 Feb 00:46
comments (4)
in cybersecurity@sh.itjust.works from blackberry@midwest.social on 18 Feb 00:46
comments (4)
Rewrite of `screen` in Rust. Feedback and advice pls.
in rust@programming.dev from CameronDev@programming.dev on 17 Feb 23:21
comments (24)
in rust@programming.dev from CameronDev@programming.dev on 17 Feb 23:21
comments (24)
0+0 > 0: C++ thread-local storage performance
(yosefk.com)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 21:29
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 21:29
comments (0)
Can atproto scale down?
(bsky.bad-example.com)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 21:10
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 21:10
comments (0)
How do modern compilers choose which variables to put in registers?
(langdev.stackexchange.com)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 20:59
comments (0)
dupe: programming@programming.dev (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 20:59
comments (0)
dupe: programming@programming.dev (0)
Get in loser. We're rewinding the stack.
(andrews.substack.com)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 20:57
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 17 Feb 20:57
comments (0)
New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 12:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 12:03
comments (0)
Resecurity | The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets
(www.resecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 12:02
comments (0)
How AI was used in an advanced phishing campaign targeting Gmail users
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 12:02
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 12:02
comments (1)
Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:56
comments (0)
Pennsylvania utility says MOVEit breach at vendor exposed some customer data
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:55
comments (0)
New FinalDraft malware abuses Outlook mail service for stealthy comms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:53
comments (0)
PirateFi game on Steam caught installing password-stealing malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:52
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Feb 11:52
comments (4)
Seems like Jiff got some performance optimizations
(github.com)
in rust@programming.dev from snaggen@programming.dev on 17 Feb 08:52
comments (4)
in rust@programming.dev from snaggen@programming.dev on 17 Feb 08:52
comments (4)
What are some good resources to learn to write very reliable/formally verifiable software?
in programming@programming.dev from flavonol@lemmy.world on 16 Feb 15:47
comments (17)
in programming@programming.dev from flavonol@lemmy.world on 16 Feb 15:47
comments (17)
Lessons from David Lynch: A Software Developer's Perspective
(lackofimagination.org)
in programming@programming.dev from Aijan@programming.dev on 16 Feb 09:55
comments (0)
in programming@programming.dev from Aijan@programming.dev on 16 Feb 09:55
comments (0)
[Solved] How can I keep cargo build artifacts in RAM?
in rust@programming.dev from onlinepersona@programming.dev on 16 Feb 09:07
comments (9)
in rust@programming.dev from onlinepersona@programming.dev on 16 Feb 09:07
comments (9)
What is device code phishing, and why are Russian spies so successful at it?
(arstechnica.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 15 Feb 18:44
comments (0)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 15 Feb 18:44
comments (0)
[SOLVED] Any Android Qr app (preferably Open Source) that allows decoding via "open with" or share?
in programming@programming.dev from MonkderVierte@lemmy.ml on 15 Feb 15:09
comments (9)
in programming@programming.dev from MonkderVierte@lemmy.ml on 15 Feb 15:09
comments (9)
people who gave comptia security+ am i improving/ready for the test?
in cybersecurity@sh.itjust.works from Live_Let_Live@lemmy.world on 15 Feb 09:39
comments (4)
in cybersecurity@sh.itjust.works from Live_Let_Live@lemmy.world on 15 Feb 09:39
comments (4)
Government Networks Being Exposed
(cyberintel.substack.com)
in cybersecurity@sh.itjust.works from TheAbominable@lemmy.world on 14 Feb 22:44
comments (5)
in cybersecurity@sh.itjust.works from TheAbominable@lemmy.world on 14 Feb 22:44
comments (5)
A chaotic Go package
in golang@programming.dev from PasswordIsTaco@infosec.pub on 14 Feb 22:24
comments (0)
in golang@programming.dev from PasswordIsTaco@infosec.pub on 14 Feb 22:24
comments (0)
China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers
(www.wired.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 18:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 18:12
comments (0)
Hacker leaks account data of 12 million Zacks Investment users
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 14:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 14:23
comments (0)
Exploitation of Old ThinkPHP, OwnCloud Vulnerabilities Surges
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 14:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 14:22
comments (0)
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:51
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:51
comments (1)
RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:50
comments (0)
Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:49
comments (0)
whoAMI attacks give hackers code execution on Amazon EC2 instances
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Feb 12:30
comments (0)
Spyware maker caught distributing malicious Android apps for years
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 13 Feb 15:13
comments (2)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 13 Feb 15:13
comments (2)
Fossil: A Coherent Software Configuration Management System (self hosted git & GitHub alternative)
(fossil-scm.org)
in programming@programming.dev from bestboyfriendintheworld@sh.itjust.works on 13 Feb 13:59
comments (2)
in programming@programming.dev from bestboyfriendintheworld@sh.itjust.works on 13 Feb 13:59
comments (2)
New Malware Exploiting Outlook As a Communication Channel via The Microsoft Graph API
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:20
comments (1)
Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:20
comments (0)
Massive IoT Data Breach Exposes 2.7 Billion Records
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:20
comments (1)
DPRK hackers dupe targets into typing PowerShell commands as admin
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 13:17
comments (1)
2024 State of Rust Survey Results
(blog.rust-lang.org)
in rust@programming.dev from SorteKanin@feddit.dk on 13 Feb 12:55
comments (15)
in rust@programming.dev from SorteKanin@feddit.dk on 13 Feb 12:55
comments (15)
AultCare Announces Data Breach Affecting Employer-Sponsored Health Plan Participants | JD Supra
(www.jdsupra.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 12:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 12:27
comments (0)
Microsoft Uncovers Sandworm Subgroup's Global Cyber Attacks Spanning 15+ Countries
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 12:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 12:27
comments (0)
Millions exposed as 14M shipping records accidentally leaked
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 12:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Feb 12:26
comments (1)
A survey of every iterator variant
(blog.yoshuawuyts.com)
in rust@programming.dev from turbohz@programming.dev on 13 Feb 08:24
comments (0)
in rust@programming.dev from turbohz@programming.dev on 13 Feb 08:24
comments (0)
Codeberg down, berg down
in programming@programming.dev from paequ2@lemmy.today on 13 Feb 05:59
comments (37)
in programming@programming.dev from paequ2@lemmy.today on 13 Feb 05:59
comments (37)
Codeberg is currently suffering from hate campaigns due to far-right forces
(blog.codeberg.org)
in programming@programming.dev from mox@lemmy.sdf.org on 12 Feb 21:37
comments (5)
in programming@programming.dev from mox@lemmy.sdf.org on 12 Feb 21:37
comments (5)
[Noob here] Can someone explain to me the advantage of mutable objects?
in programming@programming.dev from amon@lemmy.world on 12 Feb 19:58
comments (27)
in programming@programming.dev from amon@lemmy.world on 12 Feb 19:58
comments (27)
[Patched 09/02/25] Leaking the email of any YouTube user for $10,000
(brutecat.com)
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 12 Feb 13:45
comments (2)
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 12 Feb 13:45
comments (2)
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 12:52
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 12:52
comments (2)
SystemBC RAT Now Targets Linux, Spreading Ransomware and Infostealers
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:32
comments (1)
OpenAI Was Not Breached, Say Researchers
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:31
comments (0)
New hack uses prompt injection to corrupt Gemini’s long-term memory
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:22
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:22
comments (6)
OpenSSL patched high-severity flaw CVE-2024-12797
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:20
comments (0)
U.S. CISA adds Microsoft Windows, Zyxel device flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:18
comments (0)
SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:16
comments (0)
Cisco Rejects Kraken Ransomware’s Data Breach Claims
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:16
comments (0)
CVE-2025-24016 (CVSS 9.9): Critical RCE Vulnerability Discovered in Wazuh Server
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:12
comments (0)
Russian military hackers deploy malicious Windows activators in Ukraine
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:11
comments (0)
Fortinet discloses second firewall auth bypass patched in January
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:10
comments (0)
Ivanti Patches Critical Flaws in Connect Secure and Policy Secure
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:09
comments (0)
Microsoft February 2025 Patch Tuesday - SANS Internet Storm Center
(isc.sans.edu)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:08
comments (0)
SonicWall firewall exploit lets hackers hijack VPN sessions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:06
comments (0)
DDoS Attack Volume and Magnitude Continues to Soar
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Feb 11:05
comments (0)
Go 1.24 is released!
(go.dev)
in golang@programming.dev from neme@lemm.ee on 12 Feb 00:33
comments (1)
in golang@programming.dev from neme@lemm.ee on 12 Feb 00:33
comments (1)
kwinit - A CLI to scaffold all sorts of coding projects
(github.com)
in programming@programming.dev from kaamkiya@lemmy.ml on 11 Feb 21:18
comments (2)
dupe: golang@programming.dev (0)
in programming@programming.dev from kaamkiya@lemmy.ml on 11 Feb 21:18
comments (2)
dupe: golang@programming.dev (0)
A dirt simple image viewer
(github.com)
in programming@programming.dev from IsoSpandy@lemm.ee on 11 Feb 12:46
comments (4)
in programming@programming.dev from IsoSpandy@lemm.ee on 11 Feb 12:46
comments (4)
Big released bevy games
in rust@lemmy.ml from Zenlix@lemm.ee on 11 Feb 08:24
comments (0)
in rust@lemmy.ml from Zenlix@lemm.ee on 11 Feb 08:24
comments (0)
Why WebAssembly (WASM) is the Future of High-Performance Web Apps
(dev.to)
in programming@programming.dev from cm0002@lemmy.world on 11 Feb 15:35
comments (6)
in programming@programming.dev from cm0002@lemmy.world on 11 Feb 15:35
comments (6)
How to make watch faces
in programming@programming.dev from UnRelatedBurner@sh.itjust.works on 11 Feb 16:19
comments (7)
in programming@programming.dev from UnRelatedBurner@sh.itjust.works on 11 Feb 16:19
comments (7)
C++, Go, and Rust gaining popularity – Tiobe
(www.infoworld.com)
in programming@programming.dev from cm0002@lemmy.world on 11 Feb 15:23
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 11 Feb 15:23
comments (2)
Jiff 0.2.0 is released
(github.com)
in rust@programming.dev from snaggen@programming.dev on 11 Feb 14:27
comments (4)
in rust@programming.dev from snaggen@programming.dev on 11 Feb 14:27
comments (4)
Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:46
comments (1)
Over 12,000 KerioControl firewalls exposed to exploited RCE flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:44
comments (0)
Handala Hackers Claim Israeli Police Breach, Leak 350,000 Files
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:39
comments (0)
Georgia Hospital Alerts 120,000 Individuals of Data Breach
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:38
comments (0)
Apple Update Mitigates “Extremely Sophisticated” Zero-Day Exploit
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:37
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Feb 12:37
comments (2)
PoC Exploit Released for AnyDesk Vulnerability Exploited to Gain Admin Access Via Wallpapers
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 11 Feb 05:27
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 11 Feb 05:27
comments (0)
Testing Assembly Code with Rust
(kellnr.io)
in rust@programming.dev from secana@programming.dev on 10 Feb 19:43
comments (0)
in rust@programming.dev from secana@programming.dev on 10 Feb 19:43
comments (0)
Tankies of Lemmy how do you explain a Heart Monitor having a reverse backdoor with the IP of a university in China?
(www.cisa.gov)
in cybersecurity@sh.itjust.works from TheEighthDoctor@lemmy.zip on 10 Feb 16:05
comments (10)
in cybersecurity@sh.itjust.works from TheEighthDoctor@lemmy.zip on 10 Feb 16:05
comments (10)
Cloudflare outage caused by botched blocking of phishing URL
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 12:29
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 12:29
comments (6)
Cisco Hacked – Ransomware Group Allegedly Breach Internal Network & Gained AD Access
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:52
comments (0)
HPE notifies employees of data breach after Russian Office 365 hack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:51
comments (0)
LLM Hijackers Quickly Incorporate DeepSeek API Keys
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:42
comments (1)
XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:42
comments (0)
The Anatomy of Abyss Locker Ransomware Attack
(www.sygnia.co)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:41
comments (0)
Malicious ML models discovered on Hugging Face platform
(www.reversinglabs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:39
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:39
comments (6)
7,000 Exposed Ollama APIs Leave DeepSeek AI Models Wide Open to Attack
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:35
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:35
comments (5)
Massive brute force attack uses 2.8 million IPs to target VPN devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:34
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:34
comments (1)
ChatGPT users warned 20M OpenAI account logins up for sale on hacker forum
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Feb 11:33
comments (2)
UK Is Ordering Apple to Break Its Own Encryption - Schneier on Security
(www.schneier.com)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 10 Feb 11:05
comments (2)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 10 Feb 11:05
comments (2)
uscope: A New Debugger and Introspection Toolchain [for Linux]
(calabro.io)
in programming@programming.dev from mox@lemmy.sdf.org on 09 Feb 21:46
comments (0)
in programming@programming.dev from mox@lemmy.sdf.org on 09 Feb 21:46
comments (0)
“This was CS50”: Yale ends largest computer science course
(yaledailynews.com)
in programming@programming.dev from misk@sopuli.xyz on 09 Feb 21:10
comments (18)
in programming@programming.dev from misk@sopuli.xyz on 09 Feb 21:10
comments (18)
Coders or lemmy, what editors do you use? Is it worth learning a new one?
in programming@programming.dev from verstra@programming.dev on 09 Feb 10:01
comments (142)
in programming@programming.dev from verstra@programming.dev on 09 Feb 10:01
comments (142)
Do you use a macro keyboard for shortcuts? If so, what for and what size?
in programming@programming.dev from 0101100101@programming.dev on 08 Feb 18:56
comments (55)
in programming@programming.dev from 0101100101@programming.dev on 08 Feb 18:56
comments (55)
A Programming Language For Building NES Games
(hackaday.com)
in programming@programming.dev from cm0002@lemmy.world on 08 Feb 16:49
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 08 Feb 16:49
comments (1)
Is there any drag and drop method to develop a GUI with Rust?
in rust@lemmy.ml from commander@lemmings.world on 07 Feb 14:29
comments (0)
in rust@lemmy.ml from commander@lemmings.world on 07 Feb 14:29
comments (0)
Teen on Musk’s DOGE Team Graduated from ‘The Com’ – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from x00z@lemmy.world on 08 Feb 02:51
comments (15)
in cybersecurity@sh.itjust.works from x00z@lemmy.world on 08 Feb 02:51
comments (15)
JS frameworks 2025
(www.infoworld.com)
in programming@programming.dev from mesamunefire@lemmy.world on 07 Feb 22:42
comments (1)
in programming@programming.dev from mesamunefire@lemmy.world on 07 Feb 22:42
comments (1)
Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Feb 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Feb 11:42
comments (0)
Microsoft says attackers use exposed ASP.NET keys to deploy malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Feb 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Feb 11:41
comments (0)
Threat Actors Still Leveraging Legit RMM Tool ScreenConnect for Persistence in Cyberattacks
(www.silentpush.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Feb 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Feb 11:39
comments (0)
Efficiently Extending Python: PyO3 and Rust in Action
(www.blueshoe.io)
in rust@programming.dev from snaggen@programming.dev on 07 Feb 07:36
comments (1)
in rust@programming.dev from snaggen@programming.dev on 07 Feb 07:36
comments (1)
Critical RCE bug in Microsoft Outlook now exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:50
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:50
comments (1)
DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:49
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:49
comments (3)
Top 3 Ransomware Threats Active in 2025
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:47
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:47
comments (1)
Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’? – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:46
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:46
comments (3)
F5 BIG-IP SNMP Flaw Allows Attackers to Launch DoS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:45
comments (0)
OpenAI Data Breach - Threat Actor Allegedly Claims 20 Million Logins for Sale
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:45
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:45
comments (3)
Abyss Locker Ransomware Attacking critical network devices including ESXi servers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 19:44
comments (0)
My open source, selfhosted PDF manager, viewer and editor reached over 600 stars on github
(github.com)
in programming@programming.dev from mrmn@lemmy.world on 06 Feb 19:15
comments (1)
in programming@programming.dev from mrmn@lemmy.world on 06 Feb 19:15
comments (1)
Several Tokio Marine HCC Companies File Collective Notice of Data Breach | JD Supra
(www.jdsupra.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:33
comments (0)
Trump Hotels allegedly breached by a little-known BreachForums user
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:33
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:33
comments (1)
Researchers warn of risks tied to abandoned cloud storage buckets
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:33
comments (0)
Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:32
comments (0)
Crypto-stealing apps found in Apple App Store for the first time
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:31
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:31
comments (2)
More destructive cyberattacks target financial institutions - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:30
comments (0)
Ransomware payments fell by 35% in 2024, totalling $813,550,000
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:30
comments (0)
AMD fixes bug that lets hackers load malicious microcode patches
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Feb 15:30
comments (0)
crates.io: development update
(blog.rust-lang.org)
in rust@programming.dev from snaggen@programming.dev on 06 Feb 13:31
comments (0)
in rust@programming.dev from snaggen@programming.dev on 06 Feb 13:31
comments (0)
Rust Port of GNU factor (128-bit)
(github.com)
in rust@programming.dev from jasory@programming.dev on 06 Feb 12:09
comments (0)
in rust@programming.dev from jasory@programming.dev on 06 Feb 12:09
comments (0)
Why hasn't gradle been adopted for C/C++ projects?
in programming@programming.dev from onlinepersona@programming.dev on 06 Feb 10:31
comments (16)
in programming@programming.dev from onlinepersona@programming.dev on 06 Feb 10:31
comments (16)
How do you structure your models save/load code?
in programming@programming.dev from pe1uca@lemmy.pe1uca.dev on 05 Feb 17:13
comments (12)
in programming@programming.dev from pe1uca@lemmy.pe1uca.dev on 05 Feb 17:13
comments (12)
0-Day Vulnerabilities in Microsoft Sysinternals Tools Allow Attackers To Launch DLL Injection Attacks on Windows
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:59
comments (0)
CVE-2025-23114 (CVSS 9.0): Critical Veeam Backup Vulnerability Enables Remote Code Execution
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:58
comments (0)
AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:58
comments (0)
Netgear warns users to patch critical WiFi router vulnerabilities
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 12:57
comments (0)
Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:48
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:48
comments (7)
Sophisticated Phishing Attack Bypasses Microsoft ADFS MFA
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:47
comments (0)
DaggerFly-Linked Linux Malware Targets Network Appliances
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:47
comments (0)
Credential Theft Becomes Cybercriminals' Favorite Target
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Feb 11:47
comments (0)