programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Under Trump, US Cyberdefense Loses Its Head
(www.wired.com)
in cybersecurity@sh.itjust.works from lindicks@lemmy.dbzer0.com on 23 Jan 21:27
comments (0)
in cybersecurity@sh.itjust.works from lindicks@lemmy.dbzer0.com on 23 Jan 21:27
comments (0)
Anyone else's company getting hounded by Anaconda.com folks?
in programming@programming.dev from th3raid0r@programming.dev on 23 Jan 19:01
comments (2)
in programming@programming.dev from th3raid0r@programming.dev on 23 Jan 19:01
comments (2)
Anyone willing to upvote this VSCode issue with me to add it to the backlog?
(github.com)
in programming@programming.dev from Primer81@lemmy.zip on 23 Jan 18:04
comments (0)
in programming@programming.dev from Primer81@lemmy.zip on 23 Jan 18:04
comments (0)
Auto debloat unused `pub` items from dependencies.
in rust@programming.dev from Doods@infosec.pub on 23 Jan 17:46
comments (12)
in rust@programming.dev from Doods@infosec.pub on 23 Jan 17:46
comments (12)
How do we login to Pixelfed with our programming.dev account?
in programming@programming.dev from kn0wmad1c@programming.dev on 23 Jan 17:40
comments (9)
in programming@programming.dev from kn0wmad1c@programming.dev on 23 Jan 17:40
comments (9)
Delhi Cyber Frauds Exposed: ₹49 Billion Siphoned Abroad
(www.indiaweekly.biz)
in cybersecurity@sh.itjust.works from IndiaWeekly@lemm.ee on 23 Jan 17:26
comments (0)
in cybersecurity@sh.itjust.works from IndiaWeekly@lemm.ee on 23 Jan 17:26
comments (0)
New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:57
comments (0)
SonicWall releases patches for suspected zero-day bug
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:56
comments (0)
New backdoor discovered that specifically targets Juniper routers
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:52
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:52
comments (1)
Tesla EV charger hacked twice on second day of Pwn2Own Tokyo
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 16:51
comments (0)
Researchers say new attack could take down the European power grid
(arstechnica.com)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 23 Jan 16:34
comments (2)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 23 Jan 16:34
comments (2)
Telegram captcha tricks you into running malicious PowerShell scripts
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jan 15:10
comments (3)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jan 15:10
comments (3)
MasterCard DNS Error Went Unnoticed for Years
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jan 12:56
comments (0)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Jan 12:56
comments (0)
dupe: cybersecurity@sh.itjust.works (0)
'Nnice' Ransomware Report
(www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 12:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 12:19
comments (0)
Cisco Warns of Meeting Management API Privilege Escalation Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:56
comments (0)
Open-Source ClamAV Releases Security Update for Buffer Overflow Vulnerability - Patch Now
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:55
comments (0)
Cloudflare CDN flaw leaks user location data, even through secure chat apps
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:55
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:55
comments (1)
Researcher Says ABB Building Control Products Affected by 1,000 Vulnerabilities
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:46
comments (0)
PowerSchool hacker claims they stole data of 62 million students
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:46
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:46
comments (2)
FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Jan 11:45
comments (0)
A small, simple and secure messenger
in cybersecurity@sh.itjust.works from Super_gamer46861@lemmy.world on 23 Jan 07:57
comments (0)
in cybersecurity@sh.itjust.works from Super_gamer46861@lemmy.world on 23 Jan 07:57
comments (0)
Trump ‘waved a white flag to Chinese hackers,’ senator says
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 22 Jan 22:44
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 22 Jan 22:44
comments (1)
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:32
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:32
comments (4)
New Russian campaign abuses Microsoft Teams to exfil data
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:32
comments (0)
Privacy professionals feel more stressed than ever
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:28
comments (0)
SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:27
comments (0)
Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:27
comments (0)
New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:26
comments (0)
China-aligned PlushDaemon APT compromises supply chain of Korean VPN
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:25
comments (0)
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform
(gist.github.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:24
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Jan 11:24
comments (2)
50K Fortinet firewalls still vulnerable to latest zero-day
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 21 Jan 19:58
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 21 Jan 19:58
comments (0)
Your webcam as ASCII art
(kaamkiya.github.io)
in programming@programming.dev from kaamkiya@lemmy.ml on 21 Jan 18:30
comments (15)
in programming@programming.dev from kaamkiya@lemmy.ml on 21 Jan 18:30
comments (15)
PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887)
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (1)
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (0)
Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:43
comments (0)
Bitbucket services “hard down” due to major worldwide outage
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:41
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:41
comments (3)
7-Zip fixes bug that bypasses Windows MoTW security warnings, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:28
comments (0)
[Help] How do I post and store binary data correctly in Laravel?
in programming@programming.dev from lonesomeCat@lemmy.ml on 21 Jan 14:52
comments (3)
in programming@programming.dev from lonesomeCat@lemmy.ml on 21 Jan 14:52
comments (3)
Russian Ransomware Groups Deploy Email Bombing and Teams Vishing
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:35
comments (0)
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:34
comments (0)
Dangerous new Nnice ransomware laughs at victims by replacing file extensions with ‘.xdddd’
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:33
comments (0)
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (0)
Oracle's January 2025 Critical Patch Update: Addressing 320 Security Vulnerabilities
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (1)
Amazon Details Measures to Counter S3 Encryption Hacks
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:31
comments (0)
Automate Social Media Posting With Python
(cromwell-intl.com)
in programming@programming.dev from JuanPC@lemmy.kde.social on 21 Jan 09:23
comments (3)
in programming@programming.dev from JuanPC@lemmy.kde.social on 21 Jan 09:23
comments (3)
Rust Analyzer Changelog #269
(rust-analyzer.github.io)
in rust@programming.dev from snaggen@programming.dev on 21 Jan 06:23
comments (0)
in rust@programming.dev from snaggen@programming.dev on 21 Jan 06:23
comments (0)
Advice on a project idea for learning Rust!
in programming@programming.dev from ItsWinterInNevada@lemmy.blahaj.zone on 21 Jan 02:52
comments (12)
in programming@programming.dev from ItsWinterInNevada@lemmy.blahaj.zone on 21 Jan 02:52
comments (12)
Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities
(www.securityweek.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 19:34
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 19:34
comments (0)
Text Pieces: A Rust-based Open Source App to Help Devs With Text Transformations
(news.itsfoss.com)
in rust@programming.dev from recursive_recursion@lemmy.ca on 20 Jan 18:28
comments (5)
in rust@programming.dev from recursive_recursion@lemmy.ca on 20 Jan 18:28
comments (5)
Windows 11 BitLocker-Encrypted Files Accessed Without Disassembling Laptops
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 16:39
comments (1)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 16:39
comments (1)
Functional Languages Are The Minimum
(mov.im)
in programming@programming.dev from themaniacschemer@programming.dev on 20 Jan 14:08
comments (2)
in programming@programming.dev from themaniacschemer@programming.dev on 20 Jan 14:08
comments (2)
The Scheme Philosophy
(mov.im)
in programming@programming.dev from themaniacschemer@programming.dev on 20 Jan 13:45
comments (0)
in programming@programming.dev from themaniacschemer@programming.dev on 20 Jan 13:45
comments (0)
New Microsoft 2FA Bypass Attack Warning—Dangerous And Sneaky
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:05
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:05
comments (2)
Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks
(socprime.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:04
comments (0)
Pumakit - Sophisticated Linux Rootkit That Persist Even After Reboots
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:02
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:02
comments (3)
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:01
comments (0)
Malicious PyPi package steals Discord auth tokens from devs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:00
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:00
comments (2)
Hackers Claim Breach of Hewlett Packard Enterprise, Lists Data for Sale
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (1)
Otelier data breach exposes info, hotel reservations of millions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (0)
50 years after Basic, most users still can't or won't program anything
(www.zdnet.com)
in programming@programming.dev from ProdigalFrog@slrpnk.net on 20 Jan 10:45
comments (75)
in programming@programming.dev from ProdigalFrog@slrpnk.net on 20 Jan 10:45
comments (75)
Helpful guide to setting up Qt Creator to use with Rust
(www.samontab.com)
in rust@programming.dev from DickFiasco@lemm.ee on 20 Jan 01:42
comments (0)
in rust@programming.dev from DickFiasco@lemm.ee on 20 Jan 01:42
comments (0)
ChatGPT crawler flaw opens door to DDoS, prompt injection
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 19 Jan 19:53
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 19 Jan 19:53
comments (0)
As expensive as a plane flight: Looking at some claims that quantum computers won't work.
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 19 Jan 03:45
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 19 Jan 03:45
comments (0)
How to do IPC in Linux?
in programming@programming.dev from bleistift2@sopuli.xyz on 18 Jan 20:07
comments (11)
in programming@programming.dev from bleistift2@sopuli.xyz on 18 Jan 20:07
comments (11)
Kellnr 5.3.0 released
(kellnr.io)
in rust@programming.dev from secana@programming.dev on 18 Jan 15:09
comments (0)
in rust@programming.dev from secana@programming.dev on 18 Jan 15:09
comments (0)
Cybernotes
(cybernotes.xyz)
in cybersecurity@sh.itjust.works from Wolfie@lemm.ee on 17 Jan 21:32
comments (0)
in cybersecurity@sh.itjust.works from Wolfie@lemm.ee on 17 Jan 21:32
comments (0)
iPhone USB-C is hackable, but users don't need to worry yet
(www.techspot.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 17:57
comments (23)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 17:57
comments (23)
Malware stole internal PowerSchool passwords from engineer's hacked computer
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 17 Jan 17:49
comments (2)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 17 Jan 17:49
comments (2)
AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:30
comments (0)
FCC Adopts Cybersecurity Rules in Wake of Salt Typhoon
(broadbandbreakfast.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:29
comments (1)
Top 10 web hacking techniques of 2024: nominations open
(portswigger.net)
in cybersecurity@sh.itjust.works from M33@lemmy.sdf.org on 17 Jan 13:36
comments (1)
in cybersecurity@sh.itjust.works from M33@lemmy.sdf.org on 17 Jan 13:36
comments (1)
SparrowHub - Raku Plugins for daily $work
(sparrowhub.io)
in programming@programming.dev from melezhik@programming.dev on 17 Jan 13:26
comments (0)
in programming@programming.dev from melezhik@programming.dev on 17 Jan 13:26
comments (0)
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:58
comments (0)
MSSqlPwner: Open-source tool for pentesting MSSQL servers
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:46
comments (1)
NSA Warns iPhone And Android Users—Disable Location Tracking
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:42
comments (54)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:42
comments (54)
Wolf Haldenstein law firm says 3.5 million impacted by data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:02
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:02
comments (1)
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:59
comments (0)
Chinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reports
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:18
comments (0)
FBI warns agents of call log thefts by hackers, Bloomberg News reports
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:17
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:17
comments (5)
Bypassing disk encryption on systems with automatic TPM2unlock
(oddlama.org)
in cybersecurity@sh.itjust.works from exu@feditown.com on 17 Jan 10:51
comments (2)
in cybersecurity@sh.itjust.works from exu@feditown.com on 17 Jan 10:51
comments (2)
Microsoft catches Russian state-sponsored hackers shifting tactics to WhatsApp
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:40
comments (0)
Biden administration launches cybersecurity executive order
(www.cnbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:05
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:05
comments (1)
FBI Deletes PlugX Malware from Thousands of Computers - Schneier on Security
(www.schneier.com)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 16 Jan 15:18
comments (1)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 16 Jan 15:18
comments (1)
GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
(www.imperva.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 13:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 13:51
comments (0)
How would you recommend rate limiting your own program?
in rust@programming.dev from ExperimentalGuy@programming.dev on 16 Jan 13:25
comments (8)
in rust@programming.dev from ExperimentalGuy@programming.dev on 16 Jan 13:25
comments (8)
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:51
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:51
comments (2)
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:50
comments (0)
Trusted Apps Sneak a Bug Into UEFI Boot Process
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:56
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:56
comments (2)
AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:55
comments (0)
Hackers leak configs and VPN credentials for 15,000 FortiGate devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:52
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:52
comments (4)
MikroTik botnet uses misconfigured SPF DNS records to spread malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:49
comments (0)
Room for error: European hotel chain exposes millions of guests' data
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
WEF Warns of Growing Cyber Inequity Amid Escalating Complexities
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
Cl0p ransom gang says ‘contact us’ or we'll publish data of 59 Cleo victims
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:46
comments (0)
Persy single file storage new relese
in rust@lemmy.ml from tglman@lemmy.ml on 16 Jan 00:32
comments (0)
in rust@lemmy.ml from tglman@lemmy.ml on 16 Jan 00:32
comments (0)
What's Better For A Project Portfolio: Build From Scratch Or Library Knowledge?
in programming@programming.dev from gwilikers@lemmy.ml on 16 Jan 05:58
comments (25)
in programming@programming.dev from gwilikers@lemmy.ml on 16 Jan 05:58
comments (25)
Why do libraries define their own true and false?
in programming@programming.dev from crimsonpoodle@pawb.social on 15 Jan 23:23
comments (62)
in programming@programming.dev from crimsonpoodle@pawb.social on 15 Jan 23:23
comments (62)
Go 1.24 interactive tour
(antonz.org)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 15 Jan 21:07
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 15 Jan 21:07
comments (0)
Operation 99: North Korea’s Cyber Assault on Software Developers
(securityscorecard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 18:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 18:16
comments (0)
Async rust is about concurrency
(kobzol.github.io)
in rust@programming.dev from KillTheMule@programming.dev on 15 Jan 16:01
comments (4)
in rust@programming.dev from KillTheMule@programming.dev on 15 Jan 16:01
comments (4)
Selfhosted P2P File Transfer & Messaging PWA
in cybersecurity@sh.itjust.works from positive_intentions@lemmy.ml on 15 Jan 15:29
comments (0)
in cybersecurity@sh.itjust.works from positive_intentions@lemmy.ml on 15 Jan 15:29
comments (0)
Am I crazy in thinking that bash is good enough for production?
in programming@programming.dev from Badland9085@lemm.ee on 15 Jan 14:17
comments (130)
in programming@programming.dev from Badland9085@lemm.ee on 15 Jan 14:17
comments (130)
gg - Games you can play in your terminal written in Go
(github.com)
in programming@programming.dev from kaamkiya@lemmy.ml on 15 Jan 12:45
comments (4)
dupe: golang@programming.dev (0)
in programming@programming.dev from kaamkiya@lemmy.ml on 15 Jan 12:45
comments (4)
dupe: golang@programming.dev (0)
Chrome 132 Arrives: 16 Security Fixes in Latest Stable Release
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (0)
Millions Stolen: North Korea Hackers Target Blockchain Industry
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (1)
WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:17
comments (0)
FBI deletes Chinese PlugX malware from thousands of US computers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:14
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:14
comments (7)
BenJeau/cargo-interactive-update: A cargo extension CLI tool to update your cargo direct dependencies interactively to the latest version
(github.com)
in rust@lemmy.ml from dessalines@lemmy.ml on 15 Jan 03:57
comments (0)
dupe: rust@programming.dev (1)
in rust@lemmy.ml from dessalines@lemmy.ml on 15 Jan 03:57
comments (0)
dupe: rust@programming.dev (1)
I shouldve just learnt Go I'm getting clowned on by the fucking ai I'm gonna die
in programming@programming.dev from OmegaLemmy@discuss.online on 15 Jan 05:52
comments (19)
in programming@programming.dev from OmegaLemmy@discuss.online on 15 Jan 05:52
comments (19)
Mastodon Engineering front-end job
(mastodon.social)
in programming@programming.dev from SmartmanApps@programming.dev on 15 Jan 01:52
comments (3)
in programming@programming.dev from SmartmanApps@programming.dev on 15 Jan 01:52
comments (3)
RSYNC: 6 vulnerabilities
(www.openwall.com)
in cybersecurity@sh.itjust.works from thomask@lemmy.sdf.org on 15 Jan 00:42
comments (0)
in cybersecurity@sh.itjust.works from thomask@lemmy.sdf.org on 15 Jan 00:42
comments (0)
Opinions on this syntax for enums?
in programming@programming.dev from Val@lemm.ee on 14 Jan 19:38
comments (7)
in programming@programming.dev from Val@lemm.ee on 14 Jan 19:38
comments (7)
Microsoft January 2025 Patch Tuesday
(isc.sans.edu)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:27
comments (0)
Google OAuth flaw lets attackers gain access to abandoned accounts
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:26
comments (1)
BusKill (Dead Man Switch) Warrant Canary for 2025 H1
(buskill.in)
in cybersecurity@sh.itjust.works from buskill@lemmy.sdf.org on 14 Jan 17:57
comments (0)
in cybersecurity@sh.itjust.works from buskill@lemmy.sdf.org on 14 Jan 17:57
comments (0)
US removes malware allegedly planted on computers by Chinese-backed hackers
(www.reuters.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 14 Jan 17:34
comments (3)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 14 Jan 17:34
comments (3)
UK Considers Ban on Ransomware Payments by Public Bodies
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:30
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:30
comments (6)
Is there a scripting language for building logic gate logic?
in programming@programming.dev from remotelove@lemmy.ca on 14 Jan 17:26
comments (9)
in programming@programming.dev from remotelove@lemmy.ca on 14 Jan 17:26
comments (9)
Hackers use FastHTTP in new high-speed Microsoft 365 password attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:16
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:16
comments (3)
Backdooring Your Backdoors - Another $20 Domain, More Governments
(labs.watchtowr.com)
in cybersecurity@sh.itjust.works from exu@feditown.com on 14 Jan 13:17
comments (0)
in cybersecurity@sh.itjust.works from exu@feditown.com on 14 Jan 13:17
comments (0)
Software Fast-Food
(ownerofhappy.org)
in programming@programming.dev from kookiburra@programming.dev on 14 Jan 13:06
comments (4)
in programming@programming.dev from kookiburra@programming.dev on 14 Jan 13:06
comments (4)
Insurance company accused of using secret software to illegally collect and sell location data on millions of Americans
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:55
comments (16)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:55
comments (16)
Critical SAP Flaws Revealed: CVE-2025-0070 and CVE-2025-0066 with CVSS 9.9 Demand Immediate Action
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:50
comments (0)
Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:49
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:49
comments (4)
Linux Kernel Privilege Escalation Vulnerability (CVE-2024-27397) Exploited: PoC Released
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:47
comments (0)
Microsoft: macOS bug lets hackers install malicious kernel drivers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:45
comments (1)
Runtime Diagnostics: Catching Bugs as They Happen
(lackofimagination.org)
in programming@programming.dev from Aijan@programming.dev on 14 Jan 08:52
comments (0)
in programming@programming.dev from Aijan@programming.dev on 14 Jan 08:52
comments (0)
Interest in traditional programming languages is declining: Some developers are shunning Java, Python, and C++ in favor of Rust – and the rise of AI could be the cause
(www.itpro.com)
in programming@programming.dev from cm0002@lemmy.world on 14 Jan 07:18
comments (11)
in programming@programming.dev from cm0002@lemmy.world on 14 Jan 07:18
comments (11)
On the Proof of Ownership of Digital Wallets
(www.mdpi.com)
in cryptography@lemmy.ml from jaromil@fed.dyne.org on 14 Jan 05:10
comments (1)
in cryptography@lemmy.ml from jaromil@fed.dyne.org on 14 Jan 05:10
comments (1)
Why is my CPU usage always 100%?
(www.downtowndougbrown.com)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 13 Jan 22:14
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 13 Jan 22:14
comments (0)
UK domain registry Nominet confirms breach via Ivanti zero-day
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 18:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 18:26
comments (0)
Ransomware crew abuses AWS native encryption
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:17
comments (0)
EU law enforcement training agency data breach: Data of 97,000 individuals compromised
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:15
comments (0)
Can you help me understand how references work when calling methods?
in rust@lemmy.ml from dontblink@feddit.it on 12 Jan 20:00
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 12 Jan 20:00
comments (0)
Phishing Campaigns Exploit YouTube URLs and Microsoft 365 Themes to Steal Credentials
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:41
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:41
comments (2)
NoName057 targets Italy again after Zelensky's visit to the country
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:40
comments (0)
IBM Watsonx.ai Vulnerability Let Attackers Trigger XSS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:38
comments (0)
PoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:37
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:37
comments (1)
Microsoft sues service for creating illicit content with its AI platform
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:35
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:35
comments (4)
Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
(blog.checkpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:34
comments (0)
Chinese hackers breached US government office that assesses foreign investments for national security risks
(edition.cnn.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:32
comments (0)
New Web3 attack exploits transaction simulations to steal crypto
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:31
comments (0)
How concurrency works: A visual guide
(wyounas.github.io)
in programming@programming.dev from learnbyexample@programming.dev on 12 Jan 12:59
comments (2)
in programming@programming.dev from learnbyexample@programming.dev on 12 Jan 12:59
comments (2)
Using black magic to make a fast circular buffer.
(lo.calho.st)
in programming@programming.dev from beejjorgensen@lemmy.sdf.org on 11 Jan 18:42
comments (3)
in programming@programming.dev from beejjorgensen@lemmy.sdf.org on 11 Jan 18:42
comments (3)
I made a thing.
(codeberg.org)
in programming@programming.dev from Val@lemm.ee on 11 Jan 15:55
comments (13)
in programming@programming.dev from Val@lemm.ee on 11 Jan 15:55
comments (13)
I think Deno made a huge mistake. (Node compatibility)
in programming@programming.dev from akash_rawal@lemmy.world on 11 Jan 09:52
comments (16)
in programming@programming.dev from akash_rawal@lemmy.world on 11 Jan 09:52
comments (16)
What I learned about Rust while making pastebin
in rust@programming.dev from kionite231@lemmy.ca on 11 Jan 06:15
comments (1)
in rust@programming.dev from kionite231@lemmy.ca on 11 Jan 06:15
comments (1)
Chinese cyber-spies target CFIUS investigations
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 10 Jan 21:54
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 10 Jan 21:54
comments (0)
Telefónica confirms internal ticketing system breach after data leak
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 19:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 19:45
comments (1)
Is Bare-Metal Programming Dead?
(www.designnews.com)
in programming@programming.dev from cm0002@lemmy.world on 10 Jan 18:05
comments (7)
in programming@programming.dev from cm0002@lemmy.world on 10 Jan 18:05
comments (7)
WorstFit: Unveiling Hidden Transformers in Windows ANSI!
(blog.orange.tw)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 10 Jan 14:54
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 10 Jan 14:54
comments (0)
New Gmail Cyber Attack Warning As Private Key Hackers Strike
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:04
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:04
comments (2)
Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:02
comments (0)
Fake LDAPNightmare PoC Exploit Conceals Information-Stealing Malware
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:01
comments (0)
2 HIPAA Business Associates Pay HHS Ransomware Settlements
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 11:57
comments (0)
Little frustrated with Github, gpg keys, access tokens and correct setup
in programming@programming.dev from thingsiplay@beehaw.org on 10 Jan 01:34
comments (25)
in programming@programming.dev from thingsiplay@beehaw.org on 10 Jan 01:34
comments (25)
Writing A RISC-V OS [kernel] From Scratch
(hackaday.com)
in programming@programming.dev from cm0002@lemmy.world on 10 Jan 01:26
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 10 Jan 01:26
comments (1)
A Better Federated Search
(blog.doomsdayrs.page)
in programming@programming.dev from doomsdayrs@lemmy.ml on 09 Jan 23:13
comments (13)
in programming@programming.dev from doomsdayrs@lemmy.ml on 09 Jan 23:13
comments (13)
the most important question i have: can i program a whole operating system based on UNIX using ONLY python???
in programming@programming.dev from adrianhooves@lemmy.today on 09 Jan 21:10
comments (23)
in programming@programming.dev from adrianhooves@lemmy.today on 09 Jan 21:10
comments (23)
Comprehending Proc Macros [video]
(www.youtube.com)
in rust@programming.dev from hallettj@leminal.space on 09 Jan 19:47
comments (0)
in rust@programming.dev from hallettj@leminal.space on 09 Jan 19:47
comments (0)
Proton Mail still down as Proton recovers from worldwide outage
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 19:17
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 19:17
comments (8)
Announcing Rust 1.84.0
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 09 Jan 18:57
comments (0)
in rust@programming.dev from neme@lemm.ee on 09 Jan 18:57
comments (0)
pastebin code is reduced to 42 lines :D
in rust@programming.dev from kionite231@lemmy.ca on 09 Jan 16:38
comments (10)
in rust@programming.dev from kionite231@lemmy.ca on 09 Jan 16:38
comments (10)
Fish 4.0: The Fish Of Theseus
(fishshell.com)
in rust@programming.dev from faho@lemmy.world on 09 Jan 15:33
comments (1)
in rust@programming.dev from faho@lemmy.world on 09 Jan 15:33
comments (1)
Chinese Hackers Who Breached US Treasury Were Seeking Sanctions Data, New Developments Suggest
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 13:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 13:40
comments (0)
FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 12:40
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 12:40
comments (10)
Japanese police claim China ran five-year cyberattack
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:28
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:28
comments (1)
Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:20
comments (0)
Russian ISP confirms Ukrainian hackers "destroyed" its network
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:18
comments (0)
New Research Highlights Vulnerabilities in MLOps Platforms
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:17
comments (0)
Scammers Exploit Microsoft 365 to Target PayPal Users
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
macOS Vulnerability CVE-2024-54527 Unveiled: TCC Bypass PoC Exploit Code Released
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
Here’s how hucksters are manipulating Google to promote shady Chrome extensions
(arstechnica.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 09 Jan 00:53
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 09 Jan 00:53
comments (0)
Ehy, why do you program?
in programming@programming.dev from dontblink@feddit.it on 08 Jan 22:58
comments (22)
in programming@programming.dev from dontblink@feddit.it on 08 Jan 22:58
comments (22)
StackOverflow has lost 77% of new questions compared to 2022. Lowest # since May 2009.
(gist.github.com)
in programming@programming.dev from mesamunefire@lemmy.world on 08 Jan 22:45
comments (49)
in programming@programming.dev from mesamunefire@lemmy.world on 08 Jan 22:45
comments (49)
Koto: a simple and expressive programming language, usable as an extension language for Rust applications, or as a standalone scripting language
(koto.dev)
in rust@programming.dev from BB_C@programming.dev on 08 Jan 22:33
comments (8)
dupe: programming@programming.dev (12)
in rust@programming.dev from BB_C@programming.dev on 08 Jan 22:33
comments (8)
dupe: programming@programming.dev (12)
A web framework written in bash. fully configurable, with a basic templating engine, router and much more
(donotsta.re)
in programming@programming.dev from mesamunefire@lemmy.world on 08 Jan 21:41
comments (4)
in programming@programming.dev from mesamunefire@lemmy.world on 08 Jan 21:41
comments (4)
Casio says data of 8,500 people exposed in October ransomware attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 08 Jan 20:06
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 08 Jan 20:06
comments (3)
Over 4,000 backdoors hijacked by registering expired domains
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 18:18
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 18:18
comments (1)
Goodbye SASS, welcome back native CSS
(medium.com)
in programming@programming.dev from pcouy@lemmy.pierre-couy.fr on 08 Jan 18:09
comments (27)
in programming@programming.dev from pcouy@lemmy.pierre-couy.fr on 08 Jan 18:09
comments (27)
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 14:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 14:55
comments (0)
Phishing Click Rates Triple in 2024
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 12:03
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 12:03
comments (7)
Critical BIOS/UEFI Vulnerabilities Enable Attackers To Overwrite System Firmware
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:47
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:47
comments (3)
Chrome Update Addresses High-Severity Vulnerability: CVE-2025-0291
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:46
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:46
comments (2)
New Mirai botnet targets industrial routers with zero-day exploits
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:45
comments (0)
GCC Goes For "libc Diversity" With Picolibc Support
(www.phoronix.com)
in programming@programming.dev from mox@lemmy.sdf.org on 07 Jan 23:09
comments (0)
in programming@programming.dev from mox@lemmy.sdf.org on 07 Jan 23:09
comments (0)
I am building a self-hosted PDF manager, viewer and editor
(github.com)
in programming@programming.dev from mrmn@lemmy.world on 07 Jan 21:54
comments (6)
in programming@programming.dev from mrmn@lemmy.world on 07 Jan 21:54
comments (6)