programming - metaprog
About
Collects the following groups:
https://azorius.net/g/cloudsec
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
New Windows zero-day leaks NTLM hashes, gets unofficial patch
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:47
comments (0)
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads
(labs.k7computing.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:46
comments (0)
Browser-in-the-Browser attacks target CS2 players' Steam accounts
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:44
comments (0)
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:44
comments (0)
China-linked FamousSparrow APT group resurfaces with enhanced capabilities - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:43
comments (0)
Oracle customers confirm data stolen in alleged cloud breach is valid
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:11
comments (0)
UK fines software provider £3.07 million for 2022 ransomware breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:11
comments (0)
New Atlantis AIO platform automates credential stuffing on 140 services
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:09
comments (0)
Malicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:09
comments (0)
FacePass security lapse exposes users' identification data
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:09
comments (0)
New Ransomware Group Claims Attack on US Telecom Firm WideOpenWest
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Mar 13:08
comments (0)
Dyn you have idea for `dyn`?
(smallcultfollowing.com)
in rust@programming.dev from syklemil@discuss.tchncs.de on 27 Mar 09:29
comments (0)
in rust@programming.dev from syklemil@discuss.tchncs.de on 27 Mar 09:29
comments (0)
BTCTurboMiner Made Me $500 in 3 Hours ( Here’s Proof )
in cybersecurity@sh.itjust.works from Jurxzy@lemmy.ml on 27 Mar 01:09
comments (0)
in cybersecurity@sh.itjust.works from Jurxzy@lemmy.ml on 27 Mar 01:09
comments (0)
BTCTurboMiner Made Me $500 in 3 Hours ( Here’s Proof )
in programming@programming.dev from Plainstone123@lemmy.ml on 27 Mar 01:04
comments (0)
in programming@programming.dev from Plainstone123@lemmy.ml on 27 Mar 01:04
comments (0)
BTCTurboMiner Made Me $500 in 3 Hours ( Here’s Proof )
in cybersecurity@sh.itjust.works from Plainstone123@lemmy.ml on 27 Mar 01:04
comments (0)
in cybersecurity@sh.itjust.works from Plainstone123@lemmy.ml on 27 Mar 01:04
comments (0)
BTCTurboMiner Made Me $500 in 3 Hours ( Here’s Proof )
in programming@programming.dev from Godsmark@lemmy.ml on 27 Mar 01:01
comments (0)
in programming@programming.dev from Godsmark@lemmy.ml on 27 Mar 01:01
comments (0)
US defense contractor Morse settles infosec whistleblower suit for $4.6M
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 26 Mar 20:19
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 26 Mar 20:19
comments (0)
GLSL shader version suddenly reverts to 110 from 330
in programming@programming.dev from ZILtoid1991@lemmy.world on 26 Mar 08:48
comments (1)
in programming@programming.dev from ZILtoid1991@lemmy.world on 26 Mar 08:48
comments (1)
Where can you view package details on PyPI?
in programming@programming.dev from Endmaker@ani.social on 26 Mar 09:57
comments (4)
in programming@programming.dev from Endmaker@ani.social on 26 Mar 09:57
comments (4)
Using the Presenter Pattern in Ruby on Rails
(thoughtbot.com)
in programming@programming.dev from mesamunefire@lemmy.world on 25 Mar 20:48
comments (0)
in programming@programming.dev from mesamunefire@lemmy.world on 25 Mar 20:48
comments (0)
OpenTofu becomes the real deal
(www.infoworld.com)
in programming@programming.dev from ruffsl@programming.dev on 26 Mar 07:45
comments (33)
in programming@programming.dev from ruffsl@programming.dev on 26 Mar 07:45
comments (33)
Chinese Weaver Ant hackers spied on telco network for 4 years
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 25 Mar 17:10
comments (1)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 25 Mar 17:10
comments (1)
I made a GPT to help with debugging/learning code. Rubber Goose 🦢
(chatgpt.com)
in programming@programming.dev from sirico@feddit.uk on 25 Mar 16:53
comments (1)
in programming@programming.dev from sirico@feddit.uk on 25 Mar 16:53
comments (1)
Rust is now a government conspiracy
in rust@programming.dev from onlinepersona@programming.dev on 25 Mar 13:57
comments (64)
in rust@programming.dev from onlinepersona@programming.dev on 25 Mar 13:57
comments (64)
A Sneaky Phish Just Grabbed my Mailchimp Mailing List
(www.troyhunt.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 25 Mar 09:10
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 25 Mar 09:10
comments (2)
Whole Architecture Weekly content is free now!
(www.architecture-weekly.com)
in programming@programming.dev from SmartmanApps@programming.dev on 25 Mar 05:10
comments (1)
in programming@programming.dev from SmartmanApps@programming.dev on 25 Mar 05:10
comments (1)
Public-facing Kubernetes clusters at risk of total takeover
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 25 Mar 03:50
comments (7)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 25 Mar 03:50
comments (7)
Mads Torgersen on Designing a Programming Language [EPISODE 843]
(www.youtube.com)
in programming@programming.dev from SmartmanApps@programming.dev on 24 Mar 22:42
comments (0)
in programming@programming.dev from SmartmanApps@programming.dev on 24 Mar 22:42
comments (0)
New Phishing Campaign Targets macOS Users with Fake Security Alerts
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:36
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:36
comments (3)
Linux kernel Rust module for rootkit detection
(blog.thalium.re)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:24
comments (0)
Cyberattack takes down Ukrainian state railway’s online services
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:19
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:19
comments (1)
FBI warnings are true—fake file converters do push malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 Mar 17:48
comments (5)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 Mar 17:48
comments (5)
New SvcStealer Malware Attacking Users To Steal Sensitive Data From Browsers & Apps
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
New VanHelsingRaaS Attacking Linux, BSD, ARM, and ESXi Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:01
comments (0)
Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:00
comments (0)
Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:58
comments (0)
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:56
comments (0)
Steampipe: How to secure API credentials?
in cybersecurity@sh.itjust.works from _synack@sh.itjust.works on 24 Mar 14:04
comments (10)
in cybersecurity@sh.itjust.works from _synack@sh.itjust.works on 24 Mar 14:04
comments (10)
Graduating highschool and wanting to work as a programmer, advice?
in programming@programming.dev from randomname@sh.itjust.works on 24 Mar 13:42
comments (11)
in programming@programming.dev from randomname@sh.itjust.works on 24 Mar 13:42
comments (11)
Nation-State 'Paragon' Spyware Infections Target Civil Society
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
Coinbase was primary target of recent GitHub Actions breaches
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
Cloudflare now blocks all unencrypted traffic to its API endpoints
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:55
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:55
comments (2)
Microsoft Trusted Signing service abused to code-sign malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:51
comments (0)
Next.js and the corrupt middleware: the authorizing artifact
(zhero-web-sec.github.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:50
comments (0)
Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:49
comments (0)
Oracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:48
comments (0)
[Gitoxide] March 2025 Progress update
(github.com)
in rust@programming.dev from snaggen@programming.dev on 24 Mar 07:51
comments (0)
in rust@programming.dev from snaggen@programming.dev on 24 Mar 07:51
comments (0)
RUSTAsia 2025 (March 28, 2025)
(www.rustasiaconf.com)
in rust@lemmy.ml from tomtau@aussie.zone on 23 Mar 02:37
comments (0)
in rust@lemmy.ml from tomtau@aussie.zone on 23 Mar 02:37
comments (0)
Replacing `async_std` by `smol`: What about stdin?
in rust@programming.dev from KillTheMule@programming.dev on 23 Mar 11:49
comments (4)
in rust@programming.dev from KillTheMule@programming.dev on 23 Mar 11:49
comments (4)
Creating Fluid Animations with Framer Motion
in programming@programming.dev from mbude@kbin.earth on 23 Mar 09:09
comments (0)
in programming@programming.dev from mbude@kbin.earth on 23 Mar 09:09
comments (0)
Mistakes engineers make in large established codebases
(www.seangoedecke.com)
in programming@programming.dev from lysdexic@programming.dev on 23 Mar 08:13
comments (19)
in programming@programming.dev from lysdexic@programming.dev on 23 Mar 08:13
comments (19)
TIL pprof is a thing
in golang@programming.dev from awkwardturtle@lemmy.dbzer0.com on 22 Mar 23:38
comments (4)
in golang@programming.dev from awkwardturtle@lemmy.dbzer0.com on 22 Mar 23:38
comments (4)
Help with html5 canvas performance
in programming@programming.dev from crimsonpoodle@pawb.social on 22 Mar 22:47
comments (13)
in programming@programming.dev from crimsonpoodle@pawb.social on 22 Mar 22:47
comments (13)
[PyCharm Bug tracker] Incorrect warning: "Class 'list' does not define '__getitem__', so the '[]' operator cannot be used on its instances"
(youtrack.jetbrains.com)
in programming@programming.dev from Aatube@kbin.melroy.org on 22 Mar 18:38
comments (0)
in programming@programming.dev from Aatube@kbin.melroy.org on 22 Mar 18:38
comments (0)
I want a good parallel computer
(raphlinus.github.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 22 Mar 17:56
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 22 Mar 17:56
comments (0)
Event Sourcing and CQRS: Principles and Use Cases
in programming@programming.dev from mbude@kbin.earth on 22 Mar 12:55
comments (0)
in programming@programming.dev from mbude@kbin.earth on 22 Mar 12:55
comments (0)
wow
in programming@programming.dev from vitor_gabriel@lemmy.world on 22 Mar 12:06
comments (4)
in programming@programming.dev from vitor_gabriel@lemmy.world on 22 Mar 12:06
comments (4)
[OC] Rust tops a diverse list of implementation languages in projects getting NLnet grants, Python 2nd, C is alive, and C++ is half dead!
in programming@programming.dev from BB_C@programming.dev on 22 Mar 03:26
comments (0)
in programming@programming.dev from BB_C@programming.dev on 22 Mar 03:26
comments (0)
[OC] Rust tops a diverse list of implementation languages in projects getting NLnet grants, Python 2nd, C is alive, and C++ is half dead!
in rust@programming.dev from BB_C@programming.dev on 22 Mar 03:26
comments (0)
in rust@programming.dev from BB_C@programming.dev on 22 Mar 03:26
comments (0)
rust foundation is now on mastodon
(mastodon.social)
in rust@programming.dev from neme@lemm.ee on 22 Mar 01:03
comments (1)
in rust@programming.dev from neme@lemm.ee on 22 Mar 01:03
comments (1)
Web Shell to Ransomware: New VMware Attack Vector Exposed by Sygnia
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:50
comments (2)
RansomHub affiliate uses custom backdoor Betruger
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:49
comments (0)
Key Tips for Job Interview Success
in programming@programming.dev from mbude@kbin.earth on 21 Mar 19:42
comments (6)
in programming@programming.dev from mbude@kbin.earth on 21 Mar 19:42
comments (6)
thoughtbot is pausing activity on X and Meta
(thoughtbot.com)
in programming@programming.dev from mesamunefire@lemmy.world on 21 Mar 16:32
comments (2)
in programming@programming.dev from mesamunefire@lemmy.world on 21 Mar 16:32
comments (2)
CVE-2025-0755: MongoDB C Driver Vulnerability Could Lead to Buffer Overflow
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
LayerX Labs Identifies New Phishing Campaign Targeted at Mac Users - LayerX
(layerxsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
WhatsApp fixed zero-day used to deploy Paragon Graphite spyware
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
Operation FishMedley targeting governments, NGOs, and think tanks
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:42
comments (0)
Rooted Androids 3,000x More Likely to Be Breached, Even iPhones Not Safe
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:41
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:41
comments (2)
Veeam RCE bug lets domain users hack backup servers, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:40
comments (0)
Zero knowledge authentication
in programming@programming.dev from tauren@lemm.ee on 21 Mar 10:36
comments (13)
in programming@programming.dev from tauren@lemm.ee on 21 Mar 10:36
comments (13)
U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:11
comments (0)
PoC Released: Windows Explorer CVE-2025-24071 Vulnerability Exposes NTLM Hashes
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:05
comments (0)
UK urges critical orgs to adopt quantum cryptography by 2035
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:04
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:04
comments (4)
HTTP Flaw in Apple’s Passwords App Left iPhone Users Vulnerable to Phishing for Over 3 Years
(techoreon.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
HellCat hackers go on a worldwide Jira hacking spree
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
No Longer My Favorite Git Commit
(mtlynch.io)
in programming@programming.dev from kwall@programming.dev on 20 Mar 14:58
comments (20)
in programming@programming.dev from kwall@programming.dev on 20 Mar 14:58
comments (20)
Infosys Settles $17.5M Class Action Lawsuit After Sprawling Third-Party Breach
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:09
comments (0)
Pennsylvania education union data breach hit 500,000 people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:08
comments (0)
South Korean Organizations Targeted by Cobalt Strike ‘Cat’ Delivered by a Rust Beacon
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (0)
Android Banking Trojan – OctoV2, masquerading as Deepseek AI
(labs.k7computing.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
New Arcane infostealer infects YouTube, Discord users via game cheats
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
Ukrainian military targeted in new Signal spear-phishing attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:06
comments (0)
IBM urges quick patching of critical AIX bugs
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:05
comments (0)
Millions of Android TV boxes disconnected from hackers, but the risk remains
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:04
comments (0)
The Pain That is GitHub Actions - Feldera Blog
(www.feldera.com)
in programming@programming.dev from Kissaki@programming.dev on 20 Mar 08:03
comments (28)
in programming@programming.dev from Kissaki@programming.dev on 20 Mar 08:03
comments (28)
The Defer Technical Specification: It Is Time
(thephd.dev)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 19 Mar 22:48
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 19 Mar 22:48
comments (0)
Memory safety for web fonts
(developer.chrome.com)
in rust@programming.dev from neme@lemm.ee on 19 Mar 21:02
comments (2)
in rust@programming.dev from neme@lemm.ee on 19 Mar 21:02
comments (2)
Another Round Of Rust Compiler Improvements Merged For GCC 15.1
(www.phoronix.com)
in rust@programming.dev from fxomt@lemmy.dbzer0.com on 19 Mar 19:20
comments (13)
in rust@programming.dev from fxomt@lemmy.dbzer0.com on 19 Mar 19:20
comments (13)
Inhibit sleep when running stuff in the terminal. Thoughts?
(discuss.kde.org)
in programming@programming.dev from ulterno@programming.dev on 19 Mar 18:05
comments (8)
in programming@programming.dev from ulterno@programming.dev on 19 Mar 18:05
comments (8)
Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:59
comments (0)
Password reuse is rampant: nearly half of observed user logins are compromised
(blog.cloudflare.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:58
comments (26)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:58
comments (26)
WhatsApp patched zero-click flaw exploited in Paragon spyware attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:57
comments (0)
US teachers' union says hackers stole sensitive personal data on over 500,000 members
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 19 Mar 16:21
comments (2)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 19 Mar 16:21
comments (2)
ICED
in rust@programming.dev from MITM0@lemmy.world on 19 Mar 14:56
comments (7)
in rust@programming.dev from MITM0@lemmy.world on 19 Mar 14:56
comments (7)
A Brief, Incomplete, and Mostly Wrong History of Programming Languages
(james-iry.blogspot.com)
in programming@programming.dev from kwall@programming.dev on 19 Mar 13:48
comments (4)
in programming@programming.dev from kwall@programming.dev on 19 Mar 13:48
comments (4)
Microsoft isn't fixing 8-year-old zero day used for spying
(www.theregister.com)
in cybersecurity@sh.itjust.works from ptz@dubvee.org on 19 Mar 13:24
comments (22)
in cybersecurity@sh.itjust.works from ptz@dubvee.org on 19 Mar 13:24
comments (22)
BlackBasta Ransomware Ties to Russian Authorities Uncovered
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
Extortion Reboot: Ransomware Crew Threatens Leak to Snowden
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:48
comments (0)
AMOS and Lumma stealers actively spread to Reddit users
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:45
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:45
comments (4)
How North Korea Launders Billions in Stolen Crypto
(www.coindesk.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:40
comments (0)
Shifting to Decentralized Data Storage: The Key to Better Data Security and Privacy - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:38
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:38
comments (3)
Blockchain gaming platform WEMIX hacked to steal $6.1 million
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (3)
Sperm donation giant California Cryobank warns of a data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (0)
Teardrop Attack: Old-School Threat Still Targeting Systems
(cybernewslive.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
Domain Registrars Powering Russian Disinformation: A Deep Dive into Tactics and Trends - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
AI Is Turbocharging Organized Crime, EU Police Agency Warns
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
Municipalities in four states (US) are struggling with cyberattacks limiting services
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:33
comments (0)
Microsoft previews new XML format for Visual Studio solutions – but replacing a longstanding format is a messy business
(devclass.com)
in programming@programming.dev from cm0002@lemmy.world on 19 Mar 02:49
comments (9)
in programming@programming.dev from cm0002@lemmy.world on 19 Mar 02:49
comments (9)
Texas mulls establishing new Cyber Command
(www.route-fifty.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 19 Mar 01:56
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 19 Mar 01:56
comments (1)
:: Additively weighted Voronoi diagram ::
(tetramatrix.github.io)
in programming@programming.dev from Gigamegs@lemmy.zip on 18 Mar 23:52
comments (3)
in programming@programming.dev from Gigamegs@lemmy.zip on 18 Mar 23:52
comments (3)
OpenJDK Java 24 Released With Garbage Collector Improvements, Deprecating x86 32-bit
(www.phoronix.com)
in programming@programming.dev from tonytins@pawb.social on 18 Mar 19:58
comments (1)
in programming@programming.dev from tonytins@pawb.social on 18 Mar 19:58
comments (1)
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 18:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 18:59
comments (0)
Massive RSA Encryption Flaw Exposes Millions Of IoT Devices To Attack
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:41
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:41
comments (6)
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
(www.cobaltstrike.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:40
comments (0)
SocGholish Malware Facilitates RansomHub Distribution
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (0)
North Korean Hackers Deploy DocSwap Malware Disguised as Security App
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (1)
Google's New YouTube Warning: No Ad Blockers or Lose Your Account?
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:37
comments (47)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:37
comments (47)
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:35
comments (0)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:35
comments (0)
dupe: cybersecurity@sh.itjust.works (0)
INDOHAXSEC Indonesian Hacking Collective | Arctic Wolf
(arcticwolf.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:34
comments (0)
OctoV2 Android Banking Trojan Masquerades as Deepseek AI in Phishing Attack
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
Microsoft: New RAT malware used for crypto theft, reconnaissance
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
Hackers target AI and crypto as software supply chain risks grow - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:32
comments (0)
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (5)
Western Alliance Bank Notifies 21,889 Consumers of Recent Data Breach Stemming from Software Vulnerability | JD Supra
(www.jdsupra.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (0)
Hackers claim they’ve breached Orange and have “very detailed” information
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (1)
'Dead simple' RCE exploit in Apache Tomcat under attack
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 18 Mar 01:50
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 18 Mar 01:50
comments (0)
Big Rust Update Merged For GCC 15 - Lands The Polonius Borrow Checker
(www.phoronix.com)
in programming@programming.dev from tonytins@pawb.social on 17 Mar 20:14
comments (4)
in programming@programming.dev from tonytins@pawb.social on 17 Mar 20:14
comments (4)
Widespread Coinbase phishing attack uncovered
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:32
comments (0)
Attackers use CSS to create evasive phishing messages
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (0)
Warning over free online file converters that actually install malware
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (10)
CISA Flags Critical Ivanti Vulnerabilities Actively Exploited In The Wild
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:30
comments (0)
Critical RCE flaw in Apache Tomcat actively exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (0)
Microsoft: March Windows updates mistakenly uninstall Copilot
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (4)
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft.
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 17 Mar 17:15
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 17 Mar 17:15
comments (0)
GitHub supply chain attack spills secrets from 23K projects
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Mar 13:32
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Mar 13:32
comments (6)
An open source Peer-to-peer serverless decentralized social media protocol built on IPFS
in programming@programming.dev from Plebbitor@lemmy.world on 17 Mar 12:58
comments (56)
in programming@programming.dev from Plebbitor@lemmy.world on 17 Mar 12:58
comments (56)
Fraudsters Impersonate Clop Ransomware to Extort Businesses
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:43
comments (0)
Pay, fight, or stall? The dilemma of ransomware negotiations - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:39
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:39
comments (6)
CVE-2025–24813: Apache Tomcat Path Equivalence Vulnerability
(infosecwriteups.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (0)
New Akira ransomware decryptor cracks encryptions keys using GPUs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (1)
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
(github.blog)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (0)
Erickson Companies Notifies Victims of Recent Data Breach Leaking Their SSNs | JD Supra
(www.jdsupra.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:35
comments (0)
AWS Certified Cloud Practitioner - Free Practice Quiz
(tetramatrix.github.io)
in programming@programming.dev from Gigamegs@lemmy.zip on 17 Mar 06:27
comments (6)
in programming@programming.dev from Gigamegs@lemmy.zip on 17 Mar 06:27
comments (6)
Popular GitHub Action tj-actions/changed-files is compromised with a payload that appears to attempt to dump secrets
(semgrep.dev)
in programming@programming.dev from chaospatterns@lemmy.world on 17 Mar 04:53
comments (2)
in programming@programming.dev from chaospatterns@lemmy.world on 17 Mar 04:53
comments (2)
Visualizing all books of the world in ISBN-Space
(phiresky.github.io)
in programming@programming.dev from Occhioverde@feddit.it on 16 Mar 15:29
comments (1)
in programming@programming.dev from Occhioverde@feddit.it on 16 Mar 15:29
comments (1)
unofficial chatgpt?
in programming@programming.dev from sommerset@thelemmy.club on 16 Mar 13:56
comments (9)
in programming@programming.dev from sommerset@thelemmy.club on 16 Mar 13:56
comments (9)
The ladder of bug discovery joy
(blog.meadsteve.dev)
in programming@programming.dev from meadsteve@reddthat.com on 16 Mar 13:36
comments (2)
in programming@programming.dev from meadsteve@reddthat.com on 16 Mar 13:36
comments (2)
popular github action compromised
(www.stepsecurity.io)
in cybersecurity@sh.itjust.works from leds@feddit.dk on 16 Mar 06:08
comments (0)
in cybersecurity@sh.itjust.works from leds@feddit.dk on 16 Mar 06:08
comments (0)
Rust questoin, cyclic data structures
in rust@programming.dev from solrize@lemmy.world on 15 Mar 22:15
comments (24)
in rust@programming.dev from solrize@lemmy.world on 15 Mar 22:15
comments (24)
Git 2.49 Released With Faster Packing, Rust Foreign Language Interface
(www.phoronix.com)
in programming@programming.dev from tonytins@pawb.social on 15 Mar 22:06
comments (0)
in programming@programming.dev from tonytins@pawb.social on 15 Mar 22:06
comments (0)
Questions about Argon2id and authentication handling overall
in cybersecurity@sh.itjust.works from thatonecoder@lemmy.ca on 15 Mar 20:45
comments (3)
in cybersecurity@sh.itjust.works from thatonecoder@lemmy.ca on 15 Mar 20:45
comments (3)
Robust Wavefront OBJ model parsing in C
(nullprogram.com)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 15 Mar 19:25
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 15 Mar 19:25
comments (0)
[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.
(www.bentasker.co.uk)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Mar 19:16
comments (1)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Mar 19:16
comments (1)
Quicksort with Jenkins for Fun and No Profit
(susam.net)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 14 Mar 22:48
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 14 Mar 22:48
comments (0)
Why Java endures: The foundation of modern enterprise development
(github.blog)
in programming@programming.dev from tonytins@pawb.social on 14 Mar 18:53
comments (24)
in programming@programming.dev from tonytins@pawb.social on 14 Mar 18:53
comments (24)
A crawler i made with selenium and written in python
(bitbucket.org)
in programming@programming.dev from vitor_gabriel@lemmy.world on 14 Mar 17:18
comments (0)
in programming@programming.dev from vitor_gabriel@lemmy.world on 14 Mar 17:18
comments (0)
The Power of Code Reviews: Building Better Software and Stronger Teams
(thefranconiancoder.studio)
in programming@programming.dev from cm0002@lemmy.world on 14 Mar 16:37
comments (4)
in programming@programming.dev from cm0002@lemmy.world on 14 Mar 16:37
comments (4)
Self-Printing Machine Code
(susam.net)
in programming@programming.dev from maxint@programming.dev on 14 Mar 15:27
comments (0)
in programming@programming.dev from maxint@programming.dev on 14 Mar 15:27
comments (0)
It’s Not As Simple As “Use A Memory Safe Language" [S4 events]
(www.youtube.com)
in programming@programming.dev from syklemil@discuss.tchncs.de on 14 Mar 14:13
comments (1)
in programming@programming.dev from syklemil@discuss.tchncs.de on 14 Mar 14:13
comments (1)
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:28
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:28
comments (1)
dupe: cybersecurity@sh.itjust.works (0)
How to write a quine
(czterycztery.pl)
in programming@programming.dev from maxint@programming.dev on 14 Mar 12:28
comments (2)
in programming@programming.dev from maxint@programming.dev on 14 Mar 12:28
comments (2)
94% of Wi-Fi networks lack protection against deauthentication attacks - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:26
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:26
comments (8)
Jailbreaking is (mostly) simpler than you think | MSRC Blog
(msrc.microsoft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:24
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:24
comments (1)
Ransomware Hits Record High: 126% Surge in Attacks in February 2025
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:58
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:58
comments (1)
Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:44
comments (0)
Car Exploit Allows You to Spy on Drivers in Real Time
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:42
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:42
comments (3)
New SuperBlack ransomware exploits Fortinet auth bypass flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
Cisco Alerts on Public Disclosure of CVE-2025-20115 - BGP Flaw Puts Networks at Risk
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects | Microsoft Security Blog
(www.microsoft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:39
comments (0)
CISA Releases Security Advisory on 13 Industrial Control System Threats
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:38
comments (0)
GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:36
comments (0)
OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:35
comments (0)
Memory Corruption in Delphi
(blog.includesecurity.com)
in programming@programming.dev from kwall@programming.dev on 14 Mar 11:06
comments (2)
in programming@programming.dev from kwall@programming.dev on 14 Mar 11:06
comments (2)
Microsoft is making TypeScript 10x faster with native implementation in Go
(www.techspot.com)
in programming@programming.dev from BrikoX@lemmy.zip on 14 Mar 09:52
comments (16)
in programming@programming.dev from BrikoX@lemmy.zip on 14 Mar 09:52
comments (16)
ZAMM v1.0.1 - A Lovely Breakup
(zamm.dev)
in programming@programming.dev from amosjyng@programming.dev on 14 Mar 03:15
comments (0)
in programming@programming.dev from amosjyng@programming.dev on 14 Mar 03:15
comments (0)