programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Copy table in Excel and paste as a markdown table (or vice versa)
(thisdavej.com)
in programming@programming.dev from thisdavej@programming.dev on 09 May 00:32
comments (0)
in programming@programming.dev from thisdavej@programming.dev on 09 May 00:32
comments (0)
Going old-school: I'm reading "How to Design Programs" by MIT Press, and using LISP variation
in programming@programming.dev from sekxpistol@feddit.uk on 09 May 00:31
comments (7)
in programming@programming.dev from sekxpistol@feddit.uk on 09 May 00:31
comments (7)
Has anyone here had success with upgrading a Xamarin project to use Maui?
in programming@programming.dev from ExtraMedicated@lemmy.world on 08 May 20:10
comments (2)
in programming@programming.dev from ExtraMedicated@lemmy.world on 08 May 20:10
comments (2)
The many variants of the ClickFix social engineering tactic - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 17:21
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 17:21
comments (0)
CVE-2025-23123 (CVSS 10): Critical UniFi Protect Cameras Flaw Demands Immediate Updates
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 17:18
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 17:18
comments (2)
OneDrive New Feature Allows Default Sync of Personal & Corporate Accounts
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 14:41
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 14:41
comments (3)
Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 12:07
comments (0)
The Top Threat Actor Groups Targeting the Financial Sector
(flashpoint.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:48
comments (0)
Six DDoS sites seized in multi-national law enforcement operation
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:47
comments (0)
Play ransomware exploited Windows logging flaw in zero-day attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:43
comments (0)
LockBit ransomware gang hacked, victim negotiations exposed
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:42
comments (0)
UK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systems
(www.thetimes.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 08 May 11:40
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 08 May 11:40
comments (0)
CISA warns of hackers targeting critical oil infrastructure
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:40
comments (0)
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:40
comments (0)
Ransomware spike exposes cracks in cloud security - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:39
comments (0)
CLion Is Now Free for Non-Commercial Use
(blog.jetbrains.com)
in programming@programming.dev from abobla@lemm.ee on 07 May 20:55
comments (4)
in programming@programming.dev from abobla@lemm.ee on 07 May 20:55
comments (4)
Matt Godbolt sold me on Rust (by showing me C++)
(www.collabora.com)
in rust@programming.dev from snaggen@programming.dev on 07 May 19:51
comments (1)
in rust@programming.dev from snaggen@programming.dev on 07 May 19:51
comments (1)
I Made Oceans Feel ALIVE To Prove AAA Studios WRONG
(www.youtube.com)
in programming from tedu on 07 May 19:05
comments (0)
in programming from tedu on 07 May 19:05
comments (0)
Backdoor found in popular ecommerce components
(sansec.io)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 07 May 16:57
comments (2)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 07 May 16:57
comments (2)
From Russia with doubt: Go library's Kremlin ties stoke fear
(www.theregister.com)
in golang@programming.dev from cm0002@lemmy.world on 07 May 16:55
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 07 May 16:55
comments (1)
iocraft: A crate for beautiful, artisanally crafted CLIs, TUIs, and text-based IO using React-like components
(github.com)
in rust@lemmy.ml from ccbrown@programming.dev on 07 May 00:02
comments (0)
dupe: rust@programming.dev (1)
in rust@lemmy.ml from ccbrown@programming.dev on 07 May 00:02
comments (0)
dupe: rust@programming.dev (1)
Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 13:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 13:47
comments (0)
Lampion Is Back With ClickFix Lures
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 13:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 13:46
comments (0)
IT guy let lover into Deutsche Bank datacenter – lawsuit
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 13:46
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 13:46
comments (3)
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:44
comments (0)
1 in 3 workers keep AI use a secret - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:43
comments (0)
Zero-Day CLFS Vulnerability (CVE-2025-29824) Exploited in Ransomware Attacks
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:41
comments (0)
Police takes down six DDoS-for-hire services, arrests admins
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:40
comments (0)
CoGUI Phish Kit Targets Japan with Millions of Messages | Proofpoint US
(www.proofpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:39
comments (0)
Texas School District Notifies Over 47,000 People of Major Data Breach
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:39
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:39
comments (1)
Alleged cyberattack on Iran points to broader worldwide trend
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 May 11:37
comments (0)
Inferred types for function calls?
in rust@programming.dev from catch22@programming.dev on 07 May 11:33
comments (7)
in rust@programming.dev from catch22@programming.dev on 07 May 11:33
comments (7)
Return of the Crypto Inferno Drainer
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 07 May 10:47
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 07 May 10:47
comments (0)
Stack advice
in rust@programming.dev from Matty_r@programming.dev on 07 May 06:36
comments (18)
in rust@programming.dev from Matty_r@programming.dev on 07 May 06:36
comments (18)
The Curse of Knowing How, or; Fixing Everything | Blog
(notashelf.dev)
in programming@programming.dev from firelizzard@programming.dev on 06 May 17:09
comments (3)
in programming@programming.dev from firelizzard@programming.dev on 06 May 17:09
comments (3)
TeleMessage, a modified Signal clone used by US government officials, has been hacked
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 06 May 15:26
comments (8)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 06 May 15:26
comments (8)
Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:05
comments (0)
CISA Warns 2 SonicWall Vulnerabilities Under Active Exploitation
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:03
comments (0)
Italy: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national security
(decode39.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 14:32
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 14:32
comments (0)
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
(socket.dev)
in golang@programming.dev from cm0002@lemmy.world on 06 May 13:43
comments (2)
in golang@programming.dev from cm0002@lemmy.world on 06 May 13:43
comments (2)
Darcula Exposed: Inside a Global Phishing-as-a-Service Empire Powered by the Magic Cat Toolkit
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
Unauthenticated DoS Vulnerability Crashes Windows Deployment Services, No Patch
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
Google addresses 1 actively exploited vulnerability in May’s Android security update
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:31
comments (0)
GlobalX, Airline for Trump’s Deportations, Hacked
(archive.md)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 06 May 13:18
comments (0)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 06 May 13:18
comments (0)
Gunra Ransomware – A Brief Analysis - CYFIRMA
(www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:10
comments (0)
Luna Moth extortion hackers pose as IT help desks to breach US firms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:09
comments (0)
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
Microsoft finds default Kubernetes Helm charts can expose data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
Bring Your Own Installer: Bypassing SentinelOne Through Agent Version Change Interruption
(www.aon.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:05
comments (0)
What now for my career?
in programming@programming.dev from tabris@lemmy.world on 06 May 10:01
comments (15)
in programming@programming.dev from tabris@lemmy.world on 06 May 10:01
comments (15)
China has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weapons
(www.taipeitimes.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 May 09:02
comments (5)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 May 09:02
comments (5)
"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 May 08:05
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 May 08:05
comments (0)
Technical experts call on Commissioner Virkkunen for a seat on the table of the European Commission’s Technology Roadmap on encryption
(edri.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 06:23
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 06:23
comments (0)
Cloud Snitch: Open source map visualization and firewall for AWS activity, inspired by Little Snitch, built with Golang!
(github.com)
in golang@programming.dev from ccbrown@programming.dev on 06 May 03:17
comments (0)
in golang@programming.dev from ccbrown@programming.dev on 06 May 03:17
comments (0)
The new BLAKE3 hazmat API
(www.iroh.computer)
in rust@lemmy.ml from SufferingSteve@feddit.nu on 05 May 22:06
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from SufferingSteve@feddit.nu on 05 May 22:06
comments (0)
dupe: rust@programming.dev (0)
Announcing rustup 1.28.2
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 05 May 21:25
comments (0)
in rust@programming.dev from neme@lemm.ee on 05 May 21:25
comments (0)
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
PoC Published for Exploited SonicWall Vulnerabilities
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
A hacker stole data from TeleMessage, the firm that sells modified versions of Signal to the U.S. gov
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:30
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:30
comments (3)
Experts shared up-to-date C2 domains and other artifacts related to recent MintsLoader attacks
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:25
comments (0)
Germany Most Targeted Country in Q1 2025 DDoS Attacks
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:23
comments (0)
Malicious Go Modules designed to wipe Linux systems
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:56
comments (0)
Microsoft to Block Emails With 550 5.7.15 Access denied Error
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (2)
Hackers Selling SS7 0-Day Vulnerability on Hacker Forums for $5000
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (1)
Windows RDP Bug Allows Login With Expired Passwords - Microsoft Confirms No Fix
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:49
comments (15)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:49
comments (15)
StealC malware enhanced with stealth upgrades and data theft tools
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:39
comments (0)
UK Retailers Co-op, Harrods and M&S Struggle With Cyberattacks
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:38
comments (0)
Why care about the no-JS experience?
(gomakethings.com)
in programming@programming.dev from dilaw@futurology.today on 05 May 00:55
comments (40)
in programming@programming.dev from dilaw@futurology.today on 05 May 00:55
comments (40)
Cybersecurity firm SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients
(thehackernews.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 17:33
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 17:33
comments (0)
China is building a cyber army of hackers, report finds
(www.firstpost.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 12:19
comments (25)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 12:19
comments (25)
Courses for SIMPLE, website-orientated, javascript development
in programming@programming.dev from SpiderUnderUrBed@lemmy.zip on 03 May 23:03
comments (9)
in programming@programming.dev from SpiderUnderUrBed@lemmy.zip on 03 May 23:03
comments (9)
Rust Book for Devs with an OO Programming Background
(www.manning.com)
in programming@programming.dev from catch22@programming.dev on 03 May 16:40
comments (7)
in programming@programming.dev from catch22@programming.dev on 03 May 16:40
comments (7)
Green Tea, a new GC for golang
(github.com)
in golang@programming.dev from kamstrup@programming.dev on 03 May 16:22
comments (0)
in golang@programming.dev from kamstrup@programming.dev on 03 May 16:22
comments (0)
Is there are good alternative to IPFS?
in programming@programming.dev from onlinepersona@programming.dev on 03 May 09:33
comments (4)
in programming@programming.dev from onlinepersona@programming.dev on 03 May 09:33
comments (4)
There are Copilot ads in the dotnet docs
(github.com)
in programming@programming.dev from SchwertImStein@lemmy.dbzer0.com on 03 May 07:23
comments (44)
in programming@programming.dev from SchwertImStein@lemmy.dbzer0.com on 03 May 07:23
comments (44)
database greenhorn
in programming@programming.dev from PoisonedPrisonPanda@discuss.tchncs.de on 02 May 22:39
comments (23)
in programming@programming.dev from PoisonedPrisonPanda@discuss.tchncs.de on 02 May 22:39
comments (23)
FUTO License, an alternative to Closed Source
(www.youtube.com)
in programming@programming.dev from paequ2@lemmy.today on 02 May 17:35
comments (47)
in programming@programming.dev from paequ2@lemmy.today on 02 May 17:35
comments (47)
How NSA Can Spy on Air-Gapped Networks? Meet FIREWALK
(www.youtube.com)
in cybersecurity@sh.itjust.works from kugmo@sh.itjust.works on 02 May 17:25
comments (9)
in cybersecurity@sh.itjust.works from kugmo@sh.itjust.works on 02 May 17:25
comments (9)
Why Strong Passwords Matter More Than Ever
(cryptomator.org)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 02 May 16:15
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 02 May 16:15
comments (3)
Showcase: Axium, an example API
in rust@lemmy.ml from BitsandBytes@lemmy.world on 01 May 17:05
comments (0)
in rust@lemmy.ml from BitsandBytes@lemmy.world on 01 May 17:05
comments (0)
New research exposes malicious Go modules that totally wipe out your disk
(www.neowin.net)
in golang@programming.dev from neme@lemm.ee on 02 May 13:47
comments (0)
in golang@programming.dev from neme@lemm.ee on 02 May 13:47
comments (0)
A Flaw With the Security Level Slider in Tor Browser
(www.privacyguides.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 02 May 12:17
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 02 May 12:17
comments (1)
Licenses are boring but you really need one!
(distractedmind.home.blog)
in programming@programming.dev from snaggen@programming.dev on 02 May 08:37
comments (29)
in programming@programming.dev from snaggen@programming.dev on 02 May 08:37
comments (29)
Death By Specificity
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 02 May 01:31
comments (3)
in programming@programming.dev from cm0002@lemmy.world on 02 May 01:31
comments (3)
Showcase: Axium, an example API
in rust@programming.dev from BitsandBytes@lemmy.world on 01 May 17:02
comments (6)
in rust@programming.dev from BitsandBytes@lemmy.world on 01 May 17:02
comments (6)
Honest feedback- Would you use this?
in programming@programming.dev from Kevisthename@lemmy.world on 01 May 16:26
comments (18)
in programming@programming.dev from Kevisthename@lemmy.world on 01 May 16:26
comments (18)
Why performance optimization is hard work
(purplesyringa.moe)
in programming@programming.dev from learnbyexample@programming.dev on 01 May 15:29
comments (7)
in programming@programming.dev from learnbyexample@programming.dev on 01 May 15:29
comments (7)
🚨 April 2025 Vulnerability Report is out! 🚨
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 01 May 14:27
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 01 May 14:27
comments (0)
One Million Chessboards · eieio.games
(eieio.games)
in programming@programming.dev from Kissaki@programming.dev on 01 May 10:53
comments (0)
in programming@programming.dev from Kissaki@programming.dev on 01 May 10:53
comments (0)
Nova Scotia Power cybersecurity breach
(industrialcyber.co)
in cybersecurity@sh.itjust.works from CoolThingAboutMe@aussie.zone on 01 May 09:25
comments (0)
in cybersecurity@sh.itjust.works from CoolThingAboutMe@aussie.zone on 01 May 09:25
comments (0)
7 Programming Myths that waste your time | Fireship
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 01 May 01:17
comments (8)
in programming@programming.dev from cm0002@lemmy.world on 01 May 01:17
comments (8)
The Innocent Loop
(lackofimagination.org)
in programming@programming.dev from Aijan@programming.dev on 30 Apr 09:14
comments (4)
in programming@programming.dev from Aijan@programming.dev on 30 Apr 09:14
comments (4)
AWS Lambda now charges for INIT Phase
(aws.amazon.com)
in programming@programming.dev from chaospatterns@lemmy.world on 30 Apr 05:59
comments (6)
in programming@programming.dev from chaospatterns@lemmy.world on 30 Apr 05:59
comments (6)
As a .Net developer, which certifications can I get online?
in programming@programming.dev from stinky@redlemmy.com on 29 Apr 21:32
comments (5)
in programming@programming.dev from stinky@redlemmy.com on 29 Apr 21:32
comments (5)
Governments are using zero-day hacks more than ever
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 29 Apr 18:04
comments (2)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 29 Apr 18:04
comments (2)
OmniKee: Cross-platform KeePass client built with Tauri, Vue, wasm-pack
(omnikee.github.io)
in programming@programming.dev from semi@lemmy.ml on 29 Apr 17:50
comments (5)
in programming@programming.dev from semi@lemmy.ml on 29 Apr 17:50
comments (5)
Migrating away from Rust [gamedev]
(deadmoney.gg)
in programming@programming.dev from maxint@programming.dev on 29 Apr 14:14
comments (41)
in programming@programming.dev from maxint@programming.dev on 29 Apr 14:14
comments (41)
NSA, CISA top brass absent from RSA Conference
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 Apr 21:57
comments (5)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 Apr 21:57
comments (5)
How a 20 year old bug in GTA San Andreas surfaced in Windows 11 24H2
(cookieplmonster.github.io)
in programming@programming.dev from Kissaki@programming.dev on 28 Apr 13:56
comments (3)
in programming@programming.dev from Kissaki@programming.dev on 28 Apr 13:56
comments (3)
A Python client for the Global CVE Allocation System.
(github.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 28 Apr 08:07
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 28 Apr 08:07
comments (0)
How a Single Line Of Code Could Brick Your iPhone
(rambo.codes)
in programming@programming.dev from Occhioverde@feddit.it on 28 Apr 07:34
comments (4)
in programming@programming.dev from Occhioverde@feddit.it on 28 Apr 07:34
comments (4)
anti-mass-follow-bot: Removes (blocks) mass follow bots from GitHub
(github.com)
in programming@programming.dev from mesamunefire@lemmy.world on 27 Apr 21:59
comments (4)
in programming@programming.dev from mesamunefire@lemmy.world on 27 Apr 21:59
comments (4)
I like my men
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 27 Apr 12:28
comments (17)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 27 Apr 12:28
comments (17)
Theia IDE – Open-Source Cloud and Desktop IDE
(theia-ide.org)
in programming@programming.dev from Kissaki@programming.dev on 27 Apr 08:17
comments (14)
in programming@programming.dev from Kissaki@programming.dev on 27 Apr 08:17
comments (14)
A program in C++ that transforms each pixel of a image into a sprite of correspondent color.
(bitbucket.org)
in programming@programming.dev from vitor_gabriel@lemmy.world on 26 Apr 23:51
comments (1)
in programming@programming.dev from vitor_gabriel@lemmy.world on 26 Apr 23:51
comments (1)
Devs sound alarm after Microsoft subtracts C/C++ extension from VS Code forks
(www.theregister.com)
in programming@programming.dev from neme@lemm.ee on 26 Apr 19:28
comments (109)
in programming@programming.dev from neme@lemm.ee on 26 Apr 19:28
comments (109)
O(no) You Didn’t
(mrshiny608.github.io)
in golang@programming.dev from tyler@programming.dev on 26 Apr 18:14
comments (1)
dupe: programming@programming.dev (3)
in golang@programming.dev from tyler@programming.dev on 26 Apr 18:14
comments (1)
dupe: programming@programming.dev (3)
New C++ features in GCC 15
(developers.redhat.com)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:17
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:17
comments (0)
GCC, the GNU Compiler Collection 15.1 released
(gcc.gnu.org)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:14
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 25 Apr 14:14
comments (2)
Freeing Up Gigabytes: Reclaiming Disk Space from Rust Cargo Builds
(thisdavej.com)
in rust@programming.dev from thisdavej@programming.dev on 25 Apr 01:07
comments (6)
in rust@programming.dev from thisdavej@programming.dev on 25 Apr 01:07
comments (6)
How Discord Indexes Trillions of Messages
(discord.com)
in programming@programming.dev from otter@lemmy.ca on 24 Apr 20:48
comments (1)
in programming@programming.dev from otter@lemmy.ca on 24 Apr 20:48
comments (1)
Exploiting Undefined Behavior in C/C++ Programs for Optimization: A Study on the Performance Impact (concluding that observed performance gains are minimal)
(web.ist.utl.pt)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 24 Apr 20:30
comments (1)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 24 Apr 20:30
comments (1)
Bevy 0.16
(bevyengine.org)
in rust@programming.dev from Phlimy@jlai.lu on 24 Apr 20:20
comments (2)
in rust@programming.dev from Phlimy@jlai.lu on 24 Apr 20:20
comments (2)
Regarding ! coding_enthusiasts@lemmy.zip
in programming@programming.dev from Linux@lemmy.zip on 24 Apr 20:12
comments (3)
in programming@programming.dev from Linux@lemmy.zip on 24 Apr 20:12
comments (3)
Trojanized Alpine Quest app geolocates Russian soldiers
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Apr 08:11
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Apr 08:11
comments (0)
ASUS releases fix for AMI bug that lets hackers brick servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Apr 23:54
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Apr 23:54
comments (0)
Uma nova skill, ainda tem muito chão pra percorrer e caminhos a trilhar, mas hoje conquistei uma nova badge para minha coleção. Primeiros passos em mais uma ferramenta para meu #ToolBelt
in golang@programming.dev from riverfount@bolha.us on 23 Apr 23:50
comments (0)
in golang@programming.dev from riverfount@bolha.us on 23 Apr 23:50
comments (0)
AI: a fork in the road for open source
(octet-stream.net)
in programming@programming.dev from thomask@lemmy.sdf.org on 23 Apr 11:41
comments (10)
in programming@programming.dev from thomask@lemmy.sdf.org on 23 Apr 11:41
comments (10)
i want to learn/use functional programming language
in programming@programming.dev from occultist8128@infosec.pub on 23 Apr 06:58
comments (20)
in programming@programming.dev from occultist8128@infosec.pub on 23 Apr 06:58
comments (20)
JetBrains sunsets another product citing lower than expected adoption rates
(www.neowin.net)
in programming@programming.dev from cm0002@lemmy.world on 23 Apr 02:40
comments (6)
in programming@programming.dev from cm0002@lemmy.world on 23 Apr 02:40
comments (6)
Ripple’s recommended XRP library xrpl.js hacked to steal wallets
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 18:36
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 18:36
comments (1)
Git without a forge
(www.chiark.greenend.org.uk)
in programming@programming.dev from maxint@programming.dev on 22 Apr 15:13
comments (55)
in programming@programming.dev from maxint@programming.dev on 22 Apr 15:13
comments (55)
GitHub - maurymarkowitz/101-BASIC-Computer-Games: Type-in programs from the original 101 BASIC Computer Games, in their original DEC and Dartmouth dialects.
(github.com)
in programming@programming.dev from mesamunefire@lemmy.world on 22 Apr 03:26
comments (1)
in programming@programming.dev from mesamunefire@lemmy.world on 22 Apr 03:26
comments (1)
Texas city takes systems offline after cyberattack
(therecord.media)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 22 Apr 02:52
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 22 Apr 02:52
comments (1)
Bug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 steps
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 02:48
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 02:48
comments (2)
Microsoft rated this bug as low exploitability. Miscreants weaponized it in just 8 days
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 01:42
comments (8)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 01:42
comments (8)
Cheating the Reaper in Go
(mcyoung.xyz)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 21 Apr 23:49
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 21 Apr 23:49
comments (0)
Codeberg, self-hosting Gitea, or something else?
in programming@programming.dev from scheep@lemmy.world on 21 Apr 23:39
comments (19)
in programming@programming.dev from scheep@lemmy.world on 21 Apr 23:39
comments (19)
Software's Inner Platform Effect, or, Why you Might Be Hurting Yourself
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 21 Apr 19:31
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 21 Apr 19:31
comments (0)
Getting Forked by Microsoft
(philiplaine.com)
in programming@programming.dev from boramalper@lemmy.world on 21 Apr 14:14
comments (20)
in programming@programming.dev from boramalper@lemmy.world on 21 Apr 14:14
comments (20)
crc32sum - Print CRC-32 (binary mode) checksums with Python on Linux.
(github.com)
in programming@programming.dev from thingsiplay@beehaw.org on 21 Apr 11:18
comments (6)
in programming@programming.dev from thingsiplay@beehaw.org on 21 Apr 11:18
comments (6)
The Hippocratic License 3.0: An Ethical License for Open Source.
(firstdonoharm.dev)
in programming@programming.dev from tad_lispy@lemm.ee on 21 Apr 05:29
comments (28)
in programming@programming.dev from tad_lispy@lemm.ee on 21 Apr 05:29
comments (28)
Notes about "go: RLock go.mod: no locks available" and similar errors
in golang@programming.dev from e0qdk@reddthat.com on 21 Apr 03:05
comments (5)
in golang@programming.dev from e0qdk@reddthat.com on 21 Apr 03:05
comments (5)
The Web is Broken
(jan.wildeboer.net)
in cybersecurity@sh.itjust.works from Ninjazzon@infosec.pub on 20 Apr 05:38
comments (0)
in cybersecurity@sh.itjust.works from Ninjazzon@infosec.pub on 20 Apr 05:38
comments (0)
Vibe Coding is not an excuse for low-quality work
(addyo.substack.com)
in programming@programming.dev from mesamunefire@lemmy.world on 19 Apr 21:33
comments (46)
in programming@programming.dev from mesamunefire@lemmy.world on 19 Apr 21:33
comments (46)
Kellnr has a new UI
in rust@programming.dev from secana@programming.dev on 19 Apr 16:26
comments (3)
in rust@programming.dev from secana@programming.dev on 19 Apr 16:26
comments (3)
AceCode.social - Code Editor and programmable page objects
(makertube.net)
in programming@programming.dev from blue_berry@lemmy.world on 19 Apr 16:21
comments (0)
in programming@programming.dev from blue_berry@lemmy.world on 19 Apr 16:21
comments (0)
How I Got Hacked: A Warning about Malicious PoCs
(chocapikk.com)
in cybersecurity@sh.itjust.works from ByteOnBikes@slrpnk.net on 18 Apr 13:31
comments (2)
in cybersecurity@sh.itjust.works from ByteOnBikes@slrpnk.net on 18 Apr 13:31
comments (2)
EUVD: Vulnerability Database operated by ENISA (beta)
(euvd.enisa.europa.eu)
in cybersecurity@sh.itjust.works from vf2000@lemmy.zip on 18 Apr 07:40
comments (2)
in cybersecurity@sh.itjust.works from vf2000@lemmy.zip on 18 Apr 07:40
comments (2)
Marching Events: What does iCalendar have to do with ray marching?
(pwy.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 18 Apr 05:31
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 18 Apr 05:31
comments (0)
Angry Chickens 2 - Easter slingshot game (JavaScript tutorial)
(slicker.me)
in programming@programming.dev from monica_b1998@lemmy.world on 18 Apr 04:08
comments (1)
in programming@programming.dev from monica_b1998@lemmy.world on 18 Apr 04:08
comments (1)
Insecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techs
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 17 Apr 20:32
comments (0)
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 17 Apr 20:32
comments (0)
Making Software
(www.makingsoftware.com)
in programming@programming.dev from who@feddit.org on 17 Apr 18:24
comments (1)
in programming@programming.dev from who@feddit.org on 17 Apr 18:24
comments (1)
Multiple Groups Exploit NTLM Flaw in Microsoft Windows
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:06
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:06
comments (1)
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:05
comments (0)
CrazyHunter Campaign Targets Taiwanese Critical Sectors
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
New macOS Spyware PasivRobber Linked to Chinese State Actors
(cyberinsider.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:03
comments (0)
Over 16,000 Fortinet devices compromised with symlink backdoor
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:02
comments (0)
CISA warns of potential data breaches caused by legacy Oracle Cloud leak
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:00
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:00
comments (1)
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (0)
Huge ransomware campaign targets AWS S3 storage: attackers have thousands of keys
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (1)
Functional JSX-Syntax for Webcomponents.
(positive-intentions.com)
in programming@programming.dev from xoron@programming.dev on 17 Apr 12:53
comments (5)
in programming@programming.dev from xoron@programming.dev on 17 Apr 12:53
comments (5)
Vulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your location
(www.youtube.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 20:02
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 20:02
comments (0)
GCVE: Global CVE Allocation System
(gcve.eu)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 18:57
comments (2)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 18:57
comments (2)
CVE program gets a last-minute save, maybe a new home
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 16 Apr 17:16
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 16 Apr 17:16
comments (1)
Cutting Down Rust Compile Times From 30 to 2 Minutes With One Thousand Crates
(www.feldera.com)
in rust@programming.dev from ruffsl@programming.dev on 16 Apr 15:53
comments (9)
in rust@programming.dev from ruffsl@programming.dev on 16 Apr 15:53
comments (9)
C++ creator Bjarne Stroustrup reimagines how coding is taught
(stanforddaily.com)
in programming@programming.dev from cm0002@lemmy.world on 16 Apr 15:45
comments (4)
in programming@programming.dev from cm0002@lemmy.world on 16 Apr 15:45
comments (4)
Renewed Russian Phishing Campaign Against European Diplomats
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 16 Apr 14:36
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 16 Apr 14:36
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
UK Software Firm Exposed 1.1TB of Healthcare Worker Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:21
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:21
comments (0)
Windows 11 Escalation Vulnerability Let Attackers Gain Admin Access Within 300 Milliseconds
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (8)
Oracle Security Update - Patch for 378 Vulnerabilities Including Remote Exploits
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (1)
Cybersecurity World On Edge As CVE Program Prepares To Go Dark
(flip.it)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 06:28
comments (4)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 06:28
comments (4)
Notorious internet messageboard 4chan has been hacked, posts claim
(www.reuters.com)
in cybersecurity@sh.itjust.works from Jiggle_Physics@sh.itjust.works on 16 Apr 04:08
comments (3)
in cybersecurity@sh.itjust.works from Jiggle_Physics@sh.itjust.works on 16 Apr 04:08
comments (3)
The case of the UI thread that hung in a kernel call
(devblogs.microsoft.com)
in programming@programming.dev from chaospatterns@lemmy.world on 16 Apr 02:58
comments (0)
in programming@programming.dev from chaospatterns@lemmy.world on 16 Apr 02:58
comments (0)
US abruptly turns off funding for CVE program
(www.theregister.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 02:29
comments (28)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 02:29
comments (28)
The CVE program for tracking security flaws is about to lose federal funding
(www.theverge.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 15 Apr 20:49
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 15 Apr 20:49
comments (6)
Threat actors misuse Node.js to deliver malware and other malicious payloads
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Apr 20:45
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Apr 20:45
comments (0)
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:14
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:14
comments (2)
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:13
comments (0)
Google adds Android auto-reboot to block forensic data extractions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:30
comments (0)
Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
Possible Russian Hackers Targeted UK Ministry of Defense
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
Hackers Leveraging Teams Messages to Execute Malware on Windows Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (1)
New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
Over 100,000 WordPress Plugin VUlnerability Exploited Just 4 Hours After Disclosure
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:23
comments (0)
Hertz data breach: Customers in US, EU, UK, Australia and Canada affected - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:22
comments (0)
Any suggestions for a self-hosted CI that can also be run locally?
in programming@programming.dev from onlinepersona@programming.dev on 15 Apr 13:26
comments (39)
in programming@programming.dev from onlinepersona@programming.dev on 15 Apr 13:26
comments (39)
4Chan hacked
(www.the-sun.com)
in cybersecurity@sh.itjust.works from Picasso@sh.itjust.works on 15 Apr 13:04
comments (5)
in cybersecurity@sh.itjust.works from Picasso@sh.itjust.works on 15 Apr 13:04
comments (5)