programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Which software design principles do you rely on most?
in programming@programming.dev from Davy_Jones@lemmy.dbzer0.com on 09 Oct 18:27
comments (7)
in programming@programming.dev from Davy_Jones@lemmy.dbzer0.com on 09 Oct 18:27
comments (7)
Making Slint Desktop-Ready
(slint.dev)
in rust@programming.dev from cm0002@programming.dev on 09 Oct 16:28
comments (1)
in rust@programming.dev from cm0002@programming.dev on 09 Oct 16:28
comments (1)
ID photos of 70,000 users may have been leaked, Discord says
(www.bbc.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 09 Oct 14:35
comments (14)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 09 Oct 14:35
comments (14)
The State of Ransomware in Healthcare 2025 – Sophos News
(news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:31
comments (0)
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:23
comments (0)
ShinyHunters Wage Broad Corporate Extortion Spree – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:07
comments (0)
Microsoft warns about hackers abusing Teams | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:51
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:51
comments (1)
OpenAI bans some Chinese, Russian accounts using AI for evil • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:36
comments (0)
Crimson Collective hackers target AWS cloud instances for data theft
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:19
comments (0)
Hackers claim Discord breach exposed data of 5.5 million users
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:02
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:02
comments (2)
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:51
comments (0)
This Week in Rust 620 (08 OCT 2025)
(this-week-in-rust.org)
in rust@programming.dev from thingsiplay@beehaw.org on 09 Oct 12:41
comments (0)
in rust@programming.dev from thingsiplay@beehaw.org on 09 Oct 12:41
comments (0)
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:38
comments (0)
Hackers exploit auth bypass in Service Finder WordPress theme
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:17
comments (0)
Telco biz ICUK restores services after two-day DDoS pelting • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:03
comments (0)
Major US law firm says hackers broke into attorneys’ emails accounts | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 11:48
comments (0)
The illegible nature of software development talent
(surfingcomplexity.blog)
in programming@programming.dev from codeinabox@programming.dev on 09 Oct 07:15
comments (9)
in programming@programming.dev from codeinabox@programming.dev on 09 Oct 07:15
comments (9)
Fern fractal in JavaScript
(slicker.me)
in programming@programming.dev from monica_b1998@lemmy.world on 09 Oct 05:38
comments (2)
in programming@programming.dev from monica_b1998@lemmy.world on 09 Oct 05:38
comments (2)
Programming in Assembly without an Operating System
(www.youtube.com)
in programming@programming.dev from mesamunefire@piefed.social on 08 Oct 20:17
comments (0)
in programming@programming.dev from mesamunefire@piefed.social on 08 Oct 20:17
comments (0)
Met Police Arrest Two Teens in Connection with Kido Attack - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:30
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:30
comments (2)
Military radio maker BK Technologies cops to cyber break-in • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:19
comments (0)
DraftKings warns of account breaches in credential stuffing attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:06
comments (0)
North Korean hackers stole over $2 billion in cryptocurrency this year - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 14:18
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 14:18
comments (3)
VTEX data leak exposes data of 6M shoppers | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 14:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 14:04
comments (0)
The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:48
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:48
comments (3)
Phishers turn 1Password’s Watchtower into a blind spot | CSO Online
(www.csoonline.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:34
comments (0)
Salesforce refuses to pay ransom over widespread data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:17
comments (0)
Shuyal Stealer Malware Exploits 19 Browsers to Steal Logins
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:08
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:08
comments (4)
The Handle trait
(smallcultfollowing.com)
in rust@programming.dev from SorteKanin@feddit.dk on 08 Oct 08:06
comments (8)
in rust@programming.dev from SorteKanin@feddit.dk on 08 Oct 08:06
comments (8)
DidMySettingsChange - A python script that checks if windows changed your settings behind your back
(github.com)
in programming@programming.dev from androidisking@lemmy.world on 08 Oct 02:35
comments (21)
in programming@programming.dev from androidisking@lemmy.world on 08 Oct 02:35
comments (21)
Qilin Claims Ransomware Attack on Mecklenburg Schools - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:33
comments (0)
Red Hat data breach escalates as ShinyHunters joins extortion
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:18
comments (0)
Electronics giant Avnet confirms breach, says stolen data unreadable
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:02
comments (0)
Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 17:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 17:46
comments (0)
NSA and IETF: Can an attacker simply purchase standardization of weakened cryptography?
(blog.cr.yp.to)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Oct 17:02
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 07 Oct 17:02
comments (0)
A Developer’s Guide to Secrets Scanning
(www.jit.io)
in programming@programming.dev from codeinabox@programming.dev on 07 Oct 16:06
comments (0)
in programming@programming.dev from codeinabox@programming.dev on 07 Oct 16:06
comments (0)
U.S. CISA adds Smartbedded Meteobridge, Samsung, Juniper ScreenOS, Jenkins, and GNU Bash flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 14:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 14:46
comments (0)
XWorm malware resurfaces with ransomware module, over 35 plugins
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:46
comments (0)
Rhadamanthys 0.9.x - walk through the updates - Check Point Research
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:32
comments (0)
Oracle patches EBS zero-day exploited in Clop data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:01
comments (0)
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:47
comments (0)
New Study Warns Several Free iOS and Android VPN Apps Leak Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:31
comments (11)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:31
comments (11)
Massive surge in scans targeting Palo Alto Networks login portals
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:16
comments (0)
Hackers exploited Zimbra flaw as zero-day using iCalendar files
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:00
comments (0)
Stealing JWT Tokens via OAuth redirect_uri Manipulation: A Critical Vulnerability | by Shah kaif | Oct, 2025 | InfoSec Write-ups
(infosecwriteups.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:45
comments (0)
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:32
comments (0)
Chinese hackers exploiting VMware zero-day since October 2024
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
EOL Router Question/ OpenWRT
in cybersecurity@sh.itjust.works from sic_semper_tyrannis@lemmy.today on 07 Oct 13:11
comments (7)
in cybersecurity@sh.itjust.works from sic_semper_tyrannis@lemmy.today on 07 Oct 13:11
comments (7)
Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:46
comments (0)
Hackers exploiting critical Oracle EBS flaw | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:30
comments (0)
Critical 9.9 Redis vulnerability enables remote code execution | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:17
comments (1)
Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:02
comments (0)
Rainwalk Pet Insurance Exposes 158 GB of US Customer and Pet Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:46
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:46
comments (3)
Abracadabra.money hacked again | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:30
comments (0)
Suspected Chinese cyber spies targeted Serbian aviation agency
(therecord.media)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:15
comments (0)
Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:02
comments (0)
People are complaining about rustfmt, but it is effectively unmaintained
in rust@programming.dev from SorteKanin@feddit.dk on 07 Oct 10:17
comments (16)
in rust@programming.dev from SorteKanin@feddit.dk on 07 Oct 10:17
comments (16)
10 Years of Redox OS and Rust - Jeremy Soller
(youtube.com)
in rust@programming.dev from ruffsl@programming.dev on 06 Oct 23:22
comments (2)
dupe: programming@programming.dev (0)
in rust@programming.dev from ruffsl@programming.dev on 06 Oct 23:22
comments (2)
dupe: programming@programming.dev (0)
Auditorium v1.2.2 release: MPRIS support, better track sorting, optional cover art, faster track loading (all under 2% CPU usage!)
in rust@programming.dev from nate@programming.dev on 04 Oct 17:00
comments (0)
in rust@programming.dev from nate@programming.dev on 04 Oct 17:00
comments (0)
Hardware Stockholm Syndrome
(programmingsimplicity.substack.com)
in programming@programming.dev from floofloof@lemmy.ca on 07 Oct 05:13
comments (14)
in programming@programming.dev from floofloof@lemmy.ca on 07 Oct 05:13
comments (14)
Code comments should apply to the state of the system at the point the comment “executes”
(devblogs.microsoft.com)
in programming@programming.dev from PhilipTheBucket@quokk.au on 06 Oct 23:07
comments (17)
in programming@programming.dev from PhilipTheBucket@quokk.au on 06 Oct 23:07
comments (17)
ALGOL 68 Programming Language Support Still Being Worked On For GCC - Phoronix
(www.phoronix.com)
in programming@programming.dev from cm0002@programming.dev on 06 Oct 20:44
comments (2)
in programming@programming.dev from cm0002@programming.dev on 06 Oct 20:44
comments (2)
Microsoft 365 Copilot's commercial failure
(www.perspectives.plus)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 06 Oct 16:16
comments (38)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 06 Oct 16:16
comments (38)
Wine 10.16 released - run Windows applications under Linux
(gitlab.winehq.org)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 06 Oct 16:04
comments (0)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 06 Oct 16:04
comments (0)
How exactly does one get better at programming?
in programming@programming.dev from chrischryse@lemmy.world on 06 Oct 13:39
comments (78)
in programming@programming.dev from chrischryse@lemmy.world on 06 Oct 13:39
comments (78)
Inside the Volkswagen emissions cheating software [2016]
(lwn.net)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 05 Oct 13:01
comments (0)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 05 Oct 13:01
comments (0)
ShinyHunters launches Salesforce data leak site to extort 39 victims
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:55
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:55
comments (0)
CommetJacking attack tricks Comet browser into stealing emails
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:53
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:53
comments (1)
3rd Party Providing Discord Customer Service Breached
(www.theverge.com)
in cybersecurity@sh.itjust.works from HexesofVexes@lemmy.world on 04 Oct 09:24
comments (1)
in cybersecurity@sh.itjust.works from HexesofVexes@lemmy.world on 04 Oct 09:24
comments (1)
Discussion between John Ousterhout and Robert Martin ("Uncle Bob") on "A Philosophy of Software Design" and "Clean Code"
(github.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Oct 06:31
comments (25)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 04 Oct 06:31
comments (25)
Le Tour du Hack 2025 talks now available on PeerTube!
(video.infosec.exchange)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 03 Oct 14:21
comments (1)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 03 Oct 14:21
comments (1)
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:30
comments (0)
CV/Resume generation?
in programming@programming.dev from _hovi_@lemmy.world on 03 Oct 13:21
comments (48)
in programming@programming.dev from _hovi_@lemmy.world on 03 Oct 13:21
comments (48)
Red Hat confirms security incident after hackers breach GitLab instance
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:15
comments (0)
766,000 Impacted by Data Breach at Dealership Software Provider Motility - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:01
comments (0)
Japan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping
(industrialcyber.co)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
Clop extortion emails claim theft of Oracle E-Business Suite data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:47
comments (0)
Renault UK Customer Records Stolen in Third-Party Breach
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:32
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:32
comments (5)
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:17
comments (1)
Attacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warns
(www.cyber.gc.ca)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 11:45
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 11:45
comments (0)
State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure"
(breached.company)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
Generate and insert Rustdocs into your Rust projects without a huge model or agent spaghetti 🦀
(github.com)
in programming@programming.dev from exgf@programming.dev on 03 Oct 03:09
comments (10)
dupe: rust@programming.dev (4)
in programming@programming.dev from exgf@programming.dev on 03 Oct 03:09
comments (10)
dupe: rust@programming.dev (4)
JetBrains to opt-in all non-commercial IDE users to training AI models
(blog.jetbrains.com)
in programming@programming.dev from cm0002@programming.dev on 02 Oct 22:37
comments (20)
in programming@programming.dev from cm0002@programming.dev on 02 Oct 22:37
comments (20)
New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:16
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:16
comments (2)
Oracle customers being bombarded with emails claiming widespread data theft | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:02
comments (0)
South Korea raises cyber threat level after huge data centre fire sparks hacking fears | South Korea | The Guardian
(www.theguardian.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:15
comments (0)
Red Hat repos raided, claims cybercrew, files stolen • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:01
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:01
comments (5)
US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:45
comments (1)
Hour-Long Email Phishing Breach Affects PHI of 150,000
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:31
comments (0)
Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:17
comments (0)
China Requires 1-Hour Cybersecurity-Incident Reports
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:03
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:03
comments (1)
Announcing diesel-async 0.7
(blog.weiznich.de)
in rust@programming.dev from weiznich@programming.dev on 02 Oct 12:59
comments (1)
in rust@programming.dev from weiznich@programming.dev on 02 Oct 12:59
comments (1)
Why Is Python So Popular in 2025?
(blog.jetbrains.com)
in programming@programming.dev from namingthingsiseasy@programming.dev on 02 Oct 12:16
comments (98)
in programming@programming.dev from namingthingsiseasy@programming.dev on 02 Oct 12:16
comments (98)
AI Coding Is Massively Overhyped, Report Finds
(futurism.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 02 Oct 06:27
comments (44)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 02 Oct 06:27
comments (44)
Release v0.34.0 · jj-vcs/jj
(github.com)
in rust@programming.dev from lens0021@lemmy.ml on 02 Oct 00:39
comments (4)
in rust@programming.dev from lens0021@lemmy.ml on 02 Oct 00:39
comments (4)
I'm learning how to fight Podman
in programming@programming.dev from stinky@redlemmy.com on 01 Oct 22:03
comments (7)
in programming@programming.dev from stinky@redlemmy.com on 01 Oct 22:03
comments (7)
Drunk CSS
(shkspr.mobi)
in programming@programming.dev from mesamunefire@piefed.social on 01 Oct 20:09
comments (2)
in programming@programming.dev from mesamunefire@piefed.social on 01 Oct 20:09
comments (2)
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 15:32
comments (13)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 15:32
comments (13)
Smishing Campaigns Exploit Cellular Routers to Target Belgium - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:31
comments (0)
'Trifecta' of Gemini Flaws Turn AI Into Attack Vehicle
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:18
comments (0)
New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:02
comments (0)
SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:48
comments (0)
Industry groups worry about cyber info sharing as key US law is set to expire | Reuters
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:30
comments (0)
Chinese hacking group ‘Phantom Taurus’ targets governments
(www.telecomstechnews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (1)
Beijing-backed burglars master .NET to target government web servers
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 01 Oct 05:43
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 01 Oct 05:43
comments (0)
Kroah-Hartman explains EU Cyber Resilience Act for open source
(www.theregister.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 01 Oct 05:01
comments (7)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 01 Oct 05:01
comments (7)
IBM to kill System z Personal Development Tool for PCs
(www.theregister.com)
in programming@programming.dev from cm0002@piefed.world on 30 Sep 21:14
comments (2)
in programming@programming.dev from cm0002@piefed.world on 30 Sep 21:14
comments (2)
Atuin Desktop: Runbooks that Run — Now Open Source
(blog.atuin.sh)
in programming@programming.dev from clot27@lemmy.zip on 30 Sep 20:03
comments (1)
in programming@programming.dev from clot27@lemmy.zip on 30 Sep 20:03
comments (1)
Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 16:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 16:44
comments (0)
Godot-Rust: September 2025 dev update
(godot-rust.github.io)
in rust@programming.dev from turbohz@programming.dev on 30 Sep 16:20
comments (4)
in rust@programming.dev from turbohz@programming.dev on 30 Sep 16:20
comments (4)
Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:45
comments (0)
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:31
comments (0)
National Cyber Authorities Launch OT Security Guidance - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:17
comments (0)
Comparing Rust to Carbon
(lwn.net)
in rust@programming.dev from Supreme@reddthat.com on 30 Sep 13:03
comments (0)
in rust@programming.dev from Supreme@reddthat.com on 30 Sep 13:03
comments (0)
'You'll never need to work again': Criminals offer reporter money to hack BBC
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:01
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:01
comments (4)
Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:48
comments (0)
Canada’s WestJet notifies American travelers whose data was hacked in June breach
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:32
comments (1)
Blogs/Podcasts covering design patterns, idiomatic Rust etc
in rust@programming.dev from Matty_r@programming.dev on 30 Sep 12:03
comments (2)
in rust@programming.dev from Matty_r@programming.dev on 30 Sep 12:03
comments (2)
Too DRY DRY, Hush Hush
(codingcraftsman.wordpress.com)
in programming@programming.dev from codeinabox@programming.dev on 30 Sep 11:01
comments (2)
in programming@programming.dev from codeinabox@programming.dev on 30 Sep 11:01
comments (2)
What are you working on?
in programming@programming.dev from jeena@piefed.jeena.net on 29 Sep 21:54
comments (39)
in programming@programming.dev from jeena@piefed.jeena.net on 29 Sep 21:54
comments (39)
How Ruby Went Off the Rails
(www.404media.co)
in programming@programming.dev from misk@piefed.social on 29 Sep 19:12
comments (4)
in programming@programming.dev from misk@piefed.social on 29 Sep 19:12
comments (4)
New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:54
comments (0)
Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:26
comments (0)
Harrods Reveals Supply Chain Breach Impacting Online Customers
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:15
comments (0)
Google Ads Used to Spread Trojan Disguised as TradingView Premium
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:46
comments (1)
Medusa Ransomware Claims Comcast Data Breach, Demands $1.2M
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:34
comments (0)
New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:25
comments (0)
Flight Recorder in Go 1.25
(go.dev)
in golang@programming.dev from nemeski@mander.xyz on 29 Sep 15:09
comments (0)
in golang@programming.dev from nemeski@mander.xyz on 29 Sep 15:09
comments (0)
Fake Microsoft Teams installers push Oyster malware via malvertising
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 13:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 13:20
comments (0)
Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 12:36
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 12:36
comments (1)
Beijing's RedNovember hacked critical US, global orgs
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 11:35
comments (0)
Rainbet's $5000 bounty for a bug that could've cost them everything
(blog.z.org)
in cybersecurity@sh.itjust.works from maxfield@lemmy.world on 28 Sep 21:12
comments (0)
in cybersecurity@sh.itjust.works from maxfield@lemmy.world on 28 Sep 21:12
comments (0)
My search for a software development job in 2025
in programming@programming.dev from deegeese@sopuli.xyz on 28 Sep 16:17
comments (37)
in programming@programming.dev from deegeese@sopuli.xyz on 28 Sep 16:17
comments (37)
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
(thehackernews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
Intel's original 64bit extensions for x86
(soc.me)
in programming@programming.dev from soc@programming.dev on 28 Sep 01:02
comments (3)
in programming@programming.dev from soc@programming.dev on 28 Sep 01:02
comments (3)
Cloudflare just got faster and more secure, powered by Rust
(blog.cloudflare.com)
in rust@programming.dev from Supreme@reddthat.com on 27 Sep 14:05
comments (1)
in rust@programming.dev from Supreme@reddthat.com on 27 Sep 14:05
comments (1)
Build a Water Simulation in Go with Raylib-go | by Tim Little | Sep, 2025
(levelup.gitconnected.com)
in golang@programming.dev from cm0002@piefed.social on 27 Sep 02:35
comments (1)
in golang@programming.dev from cm0002@piefed.social on 27 Sep 02:35
comments (1)
Fighting human trafficking with self-contained applications
(lwn.net)
in programming@programming.dev from cm0002@lemmy.world on 26 Sep 14:05
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 26 Sep 14:05
comments (0)
Creating and Loading Tilemaps Using Ebitengine (Tutorial)
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Sep 13:55
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 26 Sep 13:55
comments (0)
Meta-rule support in pest3 early alpha prototype
(github.com)
in rust@lemmy.ml from tomtau@aussie.zone on 25 Sep 12:16
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from tomtau@aussie.zone on 25 Sep 12:16
comments (0)
dupe: rust@programming.dev (0)
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Sep 00:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Sep 00:41
comments (1)
PostgreSQL 18.0 brings OAuth2, AsyncIO, performance boost
(www.phoronix.com)
in programming@programming.dev from fhoekstra@feddit.nl on 25 Sep 21:54
comments (0)
in programming@programming.dev from fhoekstra@feddit.nl on 25 Sep 21:54
comments (0)
Besides them trying to upsell me a new router, what does this mean?
in cybersecurity@sh.itjust.works from StarvingMartist@sh.itjust.works on 25 Sep 20:41
comments (13)
in cybersecurity@sh.itjust.works from StarvingMartist@sh.itjust.works on 25 Sep 20:41
comments (13)
Exploring GrapheneOS secure allocator: Hardened Malloc
(www.synacktiv.com)
in cybersecurity@sh.itjust.works from Andromxda@lemmy.dbzer0.com on 25 Sep 16:14
comments (0)
in cybersecurity@sh.itjust.works from Andromxda@lemmy.dbzer0.com on 25 Sep 16:14
comments (0)
crates.io: Malicious crates faster_log and async_println | Rust Blog
(blog.rust-lang.org)
in rust@programming.dev from turbohz@programming.dev on 25 Sep 07:35
comments (9)
in rust@programming.dev from turbohz@programming.dev on 25 Sep 07:35
comments (9)
Fuck Hackcyom
(studium.dev)
in programming@programming.dev from OsrsNeedsF2P@lemmy.ml on 25 Sep 01:52
comments (7)
in programming@programming.dev from OsrsNeedsF2P@lemmy.ml on 25 Sep 01:52
comments (7)
Just Let Me Select Text
(aartaka.me)
in programming@programming.dev from mesamunefire@piefed.social on 24 Sep 17:35
comments (13)
in programming@programming.dev from mesamunefire@piefed.social on 24 Sep 17:35
comments (13)
OnePlus leaves researchers on read over Android bug that exposes texts: Rapid7 warns flaw could let any app peek at your SMS, but smartphone vendor won't pick up
(www.rapid7.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:09
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:09
comments (0)
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
(cloud.google.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:03
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:03
comments (0)
ShadowV2 Botnet Infects AWS Docker Containers to Launch DDoS Campaign
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:44
comments (0)
New YiBackdoor Allows Attackers to Execute Arbitrary Commands and Exfiltrate Sensitive Data from Hacked Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:31
comments (0)
NPM package caught using QR Code to fetch cookie-stealing malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:38
comments (0)
CISA says hackers breached federal agency using GeoServer exploit
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:22
comments (0)
EV Charging Provider Confirm Data Breach - Customers Personal Data Exposed
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 11:52
comments (0)
Big Decimals: Stop Using Floats or Cents for Money
(medium.com)
in programming@programming.dev from Trev13@programming.dev on 24 Sep 10:05
comments (55)
in programming@programming.dev from Trev13@programming.dev on 24 Sep 10:05
comments (55)
Rust Foundation Signs Joint Statement on Open Source Infrastructure Stewardship
(rustfoundation.org)
in rust@programming.dev from CodiUnicorn@programming.dev on 24 Sep 07:22
comments (0)
in rust@programming.dev from CodiUnicorn@programming.dev on 24 Sep 07:22
comments (0)
Iranian Hackers Use Fake Job Lures to Breach Europe’s Critical Industries
(hackread.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Sep 07:16
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Sep 07:16
comments (0)
GitHub tightens npm security with mandatory 2FA, access tokens
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 18:34
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 18:34
comments (1)
22.2 Tbps DDoS Attack Breaks Internet With New World Record
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 17:02
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 17:02
comments (4)
New EDR-Freeze tool uses Windows WER to suspend security software
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 16:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 16:45
comments (1)
Hacker Laws: Laws, Theories, Principles and Patterns that developers will find useful.
(hacker-laws.com)
in programming@programming.dev from Pro@programming.dev on 23 Sep 16:14
comments (1)
in programming@programming.dev from Pro@programming.dev on 23 Sep 16:14
comments (1)
Why Zig Feels More Practical Than Rust for Real-World CLI Tools
(dayvster.com)
in programming@programming.dev from Pro@programming.dev on 23 Sep 16:02
comments (10)
in programming@programming.dev from Pro@programming.dev on 23 Sep 16:02
comments (10)
AsyncRAT spread through malicious SVG files imitating web portals
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:30
comments (1)
fitlog
(github.com)
in programming@programming.dev from jay0072007@programming.dev on 23 Sep 13:17
comments (1)
in programming@programming.dev from jay0072007@programming.dev on 23 Sep 13:17
comments (1)
Malicious GitHub pages lure MacOS users into installing Atomic infostealer - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:01
comments (0)
Humber NHS board apologises for NRS Healthcare data breach
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:26
comments (0)
Automaker giant Stellantis confirms data breach after Salesforce hack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:08
comments (0)
Mago is a toolchain for PHP. Inspired by the Rust ecosystem
(mago.carthage.software)
in rust@programming.dev from lens0021@lemmy.ml on 23 Sep 04:20
comments (1)
in rust@programming.dev from lens0021@lemmy.ml on 23 Sep 04:20
comments (1)
Which GUI crate?
in rust@programming.dev from Charger8232@lemmy.ml on 23 Sep 01:07
comments (12)
in rust@programming.dev from Charger8232@lemmy.ml on 23 Sep 01:07
comments (12)
Variadic Generics Micro Survey | Inside Rust Blog
(blog.rust-lang.org)
in rust@programming.dev from Supreme@reddthat.com on 22 Sep 17:35
comments (1)
in rust@programming.dev from Supreme@reddthat.com on 22 Sep 17:35
comments (1)
17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 14:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 14:35
comments (0)
FBI warns of cybercriminals using fake FBI crime reporting portals
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 13:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 13:58
comments (0)
[SOLVED] How do i fix expected operator
in rust@programming.dev from artiman@piefed.social on 22 Sep 13:10
comments (7)
in rust@programming.dev from artiman@piefed.social on 22 Sep 13:10
comments (7)
Writing a Bootloader: Part 4 Protected Mode
(medium.com)
in programming@programming.dev from Trev13@programming.dev on 22 Sep 12:28
comments (0)
in programming@programming.dev from Trev13@programming.dev on 22 Sep 12:28
comments (0)
Some thoughts on programming 3 years into full time
in programming@programming.dev from moseschrute@lemmy.world on 22 Sep 10:23
comments (5)
in programming@programming.dev from moseschrute@lemmy.world on 22 Sep 10:23
comments (5)
Fifty Years of Open Source Software Supply-Chain Security
(cacm.acm.org)
in programming@programming.dev from who@feddit.org on 21 Sep 17:39
comments (3)
in programming@programming.dev from who@feddit.org on 21 Sep 17:39
comments (3)
(Git): Introduce Rust and announce that it will become mandatory
(lore.kernel.org)
in rust@programming.dev from Supreme@reddthat.com on 20 Sep 23:59
comments (6)
in rust@programming.dev from Supreme@reddthat.com on 20 Sep 23:59
comments (6)
Heathrow flights delayed and cancelled as cyber-attack hits European airports
(www.theguardian.com)
in cybersecurity@sh.itjust.works from Blarylark@lemmy.world on 20 Sep 21:14
comments (0)
in cybersecurity@sh.itjust.works from Blarylark@lemmy.world on 20 Sep 21:14
comments (0)
Graphite (programmatic 2D art/design suite built in Rust) September update - project's largest release to date
(www.youtube.com)
in rust@programming.dev from txtr@discuss.tchncs.de on 20 Sep 14:29
comments (0)
in rust@programming.dev from txtr@discuss.tchncs.de on 20 Sep 14:29
comments (0)
Cyberattack on Collins Aerospace Disrupts Operations at Major Airports
(cyberinsider.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Sep 13:34
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Sep 13:34
comments (0)
Cyberattack disrupts European airports including Heathrow, Brussels
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 09:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 09:58
comments (0)
Critical Microsoft's Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 22:47
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 22:47
comments (1)
Click Adventure: How a Banned Steam Game Drained Wallets and Dodged Steam Security
(steamcommunity.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
ChatGPT tricked to swipe sensitive data from Gmail
(www.radware.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
Google patches sixth Chrome zero-day exploited in attacks this year
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:30
comments (1)
WatchGuard patches ‘critical’ VPN flaw in firewalls that could lead to compromise
(www.csoonline.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:19
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:19
comments (2)
Help Us Raise $200k to Free JavaScript from Oracle | Deno
(deno.com)
in programming@programming.dev from lena@gregtech.eu on 18 Sep 19:15
comments (18)
in programming@programming.dev from lena@gregtech.eu on 18 Sep 19:15
comments (18)
Pijul - DVCS, based on the theory of patches, inspired by darcs
(pijul.org)
in programming@programming.dev from Kissaki@programming.dev on 18 Sep 17:07
comments (4)
in programming@programming.dev from Kissaki@programming.dev on 18 Sep 17:07
comments (4)
Cloudflare DDoSed itself with React useEffect hook blunder
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Sep 16:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Sep 16:46
comments (1)
koanf is a library for reading configuration from different sources in different formats in Go applications (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 18 Sep 14:41
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 18 Sep 14:41
comments (0)
Announcing Rust 1.90.0
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 18 Sep 14:01
comments (4)
in rust@programming.dev from nemeski@mander.xyz on 18 Sep 14:01
comments (4)
Russia, China target German economy: Cyber attacks cost Germany almost 300 billion euros in past year, survey finds
(www.bitkom.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Sep 13:29
comments (5)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Sep 13:29
comments (5)
Wasm 3.0 Completed - WebAssembly
(webassembly.org)
in programming@programming.dev from Kissaki@programming.dev on 18 Sep 06:51
comments (7)
in programming@programming.dev from Kissaki@programming.dev on 18 Sep 06:51
comments (7)
Falggy - Sensible and fast command-line flag parsing with excellent support for subcommands and positional values (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 17 Sep 22:26
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 17 Sep 22:26
comments (0)