programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
JetBrains working on higher-abstraction programming language
(www.infoworld.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 17:40
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 17:40
comments (0)
What's the best way for testing Gin routes in Go?
in programming@programming.dev from lena@gregtech.eu on 26 Jul 16:00
comments (0)
in programming@programming.dev from lena@gregtech.eu on 26 Jul 16:00
comments (0)
Explaining Why Devs Burn Out So Often
(www.youtube.com)
in programming@programming.dev from Samskara@sh.itjust.works on 26 Jul 15:49
comments (2)
in programming@programming.dev from Samskara@sh.itjust.works on 26 Jul 15:49
comments (2)
What's the best way for testing Gin routes in Go?
in golang@programming.dev from lena@gregtech.eu on 26 Jul 15:37
comments (1)
in golang@programming.dev from lena@gregtech.eu on 26 Jul 15:37
comments (1)
Getting Started with Ebitengine (Go game engine)
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 05:00
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 26 Jul 05:00
comments (1)
Guix for development
(dthompson.us)
in programming@programming.dev from paequ2@lemmy.today on 25 Jul 23:56
comments (7)
in programming@programming.dev from paequ2@lemmy.today on 25 Jul 23:56
comments (7)
Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog
(eprint.iacr.org)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Jul 19:16
comments (0)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 25 Jul 19:16
comments (0)
ArkScript, A small, lisp-inspired, functional scripting language
(arkscript-lang.dev)
in programming@programming.dev from SuperFola@programming.dev on 25 Jul 17:38
comments (8)
in programming@programming.dev from SuperFola@programming.dev on 25 Jul 17:38
comments (8)
Hackers—hope to defect to Russia? Don’t Google “defecting to Russia.”
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 25 Jul 01:43
comments (16)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 25 Jul 01:43
comments (16)
A valid HTML zip bomb
(ache.one)
in programming@programming.dev from Pro@programming.dev on 24 Jul 23:26
comments (3)
in programming@programming.dev from Pro@programming.dev on 24 Jul 23:26
comments (3)
koto v0.16.0 released (koto is a scripting programming language)
(github.com)
in programming@programming.dev from BB_C@programming.dev on 24 Jul 07:49
comments (4)
in programming@programming.dev from BB_C@programming.dev on 24 Jul 07:49
comments (4)
Authorities in Ukraine nab alleged admin of Russian-language cybercrime forum | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:26
comments (0)
Trump AI plan pushes critical infrastructure to use AI for cyber defense | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:17
comments (14)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:17
comments (14)
Coyote in the Wild: First-Ever Malware That Abuses UI Automation | Akamai
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:10
comments (0)
Operation Cargotalon: Ung0901 Targets Russian Aerospace Defense Using Eaglet Implant
(www.seqrite.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 19:02
comments (0)
Storm-2603 spotted deploying ransomware on exploited SharePoint servers - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 18:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 18:58
comments (0)
Malware in official mouse software: Endgame Gears OP1w 4K V2 tool infected with Xred-RAT
(www.igorslab.de)
in cybersecurity@sh.itjust.works from commander@lemmy.world on 24 Jul 17:39
comments (1)
in cybersecurity@sh.itjust.works from commander@lemmy.world on 24 Jul 17:39
comments (1)
US nuclear weapons agency hacked in Microsoft SharePoint attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:26
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:26
comments (2)
Massive data leak exposes Swedish citizens' lives | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:18
comments (0)
NPM package ‘is’ with 2.8M weekly downloads infected devs with malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:09
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:09
comments (2)
Defence giant Naval Group hit with major breach | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 12:02
comments (0)
340K exposed after France Travail data breach | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jul 11:58
comments (0)
AccuWeather to discontinue free access to Core Weather API
(developer.accuweather.com)
in programming@programming.dev from Pro@programming.dev on 23 Jul 23:12
comments (26)
in programming@programming.dev from Pro@programming.dev on 23 Jul 23:12
comments (26)
You Can Now Disable All AI Features in Zed - Zed Blog
(zed.dev)
in programming@programming.dev from greywolf0x1@lemmy.ml on 23 Jul 18:04
comments (6)
in programming@programming.dev from greywolf0x1@lemmy.ml on 23 Jul 18:04
comments (6)
Logging in Go with Slog: A Practitioner's Guide
(www.dash0.com)
in golang@programming.dev from cm0002@programming.dev on 23 Jul 14:17
comments (0)
in golang@programming.dev from cm0002@programming.dev on 23 Jul 14:17
comments (0)
How Go 1.24's Swiss Tables saved us hundreds of gigabytes (DATADOG)
(www.datadoghq.com)
in golang@programming.dev from cm0002@programming.dev on 23 Jul 14:17
comments (0)
in golang@programming.dev from cm0002@programming.dev on 23 Jul 14:17
comments (0)
"The Irish State pays for China's surveillance in Ireland:" Rights group criticizes government as thousands of China's Hikvision cameras are installed across Ireland despite bans in other countries
(www.iccl.ie)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 23 Jul 10:33
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 23 Jul 10:33
comments (0)
Decentralized Module Federation For A Microfrontend Architecture
(positive-intentions.com)
in programming@programming.dev from xoron@programming.dev on 23 Jul 10:11
comments (0)
in programming@programming.dev from xoron@programming.dev on 23 Jul 10:11
comments (0)
TapTrap: new attack on Android that lures you into performing actions you did not intend to do. This allows an app to access your camera or location, or erase your device—all without your consent.
(taptrap.click)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Jul 02:23
comments (4)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Jul 02:23
comments (4)
Lawsuit says Clorox hackers got passwords simply by asking
(www.nbcnews.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Jul 02:05
comments (13)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Jul 02:05
comments (13)
Funding to protect US from Stuxnet-like worm expired Sunday
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Jul 22:10
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Jul 22:10
comments (1)
Game Dev Fundamentals - Trevors-Tutorials.com #1
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 22 Jul 19:59
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 22 Jul 19:59
comments (0)
Alternative Ergonomic Ref-counting RFC
(github.com)
in rust@programming.dev from SorteKanin@feddit.dk on 22 Jul 12:02
comments (3)
in rust@programming.dev from SorteKanin@feddit.dk on 22 Jul 12:02
comments (3)
Async Isn't Real & Cannot Hurt You
(videos.abnormalbeings.space)
in rust@programming.dev from AbnormalHumanBeing@lemmy.abnormalbeings.space on 22 Jul 11:32
comments (0)
in rust@programming.dev from AbnormalHumanBeing@lemmy.abnormalbeings.space on 22 Jul 11:32
comments (0)
Testing Your Knowledge Of JavaScript’s Date Class
(hackaday.com)
in programming@programming.dev from mesamunefire@piefed.social on 22 Jul 04:08
comments (6)
in programming@programming.dev from mesamunefire@piefed.social on 22 Jul 04:08
comments (6)
Dior begins sending data breach notifications to U.S. customers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 18:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 18:48
comments (1)
Afghan data leak: SAS and UK spies named in Afghan data breach
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 15:02
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 15:02
comments (1)
Dell confirms breach of test lab platform by World Leaks extortion group
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:57
comments (0)
Surveillance Firm Exploits SS7 Flaw to Track User Locations
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:48
comments (1)
New GhostContainer Malware Hits High-Value MS Exchange Servers in Asia
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:41
comments (0)
Singapore warns China-linked group UNC3886 targets its critical infrastructure
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:32
comments (0)
PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:25
comments (1)
4 new Android spyware samples linked to Iran's intel agency • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 14:17
comments (0)
CSS Minecraft
(benjaminaster.com)
in programming@programming.dev from cm0002@lemmy.world on 21 Jul 14:16
comments (6)
in programming@programming.dev from cm0002@lemmy.world on 21 Jul 14:16
comments (6)
Code red: turning negative feedback into positive outcome
(pvs-studio.com)
in programming@programming.dev from CodiUnicorn@programming.dev on 21 Jul 13:23
comments (1)
dupe: programming@programming.dev (1)
in programming@programming.dev from CodiUnicorn@programming.dev on 21 Jul 13:23
comments (1)
dupe: programming@programming.dev (1)
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 12:16
comments (0)
1.4 Million Affected by Data Breach at Virginia Radiology Practice - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 12:08
comments (0)
HPE warns of hardcoded passwords in Aruba access points
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 12:01
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 12:01
comments (1)
Microsoft SharePoint servers under attack via zero-day vulnerability (CVE-2025-53770) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 11:57
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 11:57
comments (2)
Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 11:50
comments (0)
Microsoft to stop using engineers in China to work on U.S. Defense computer systems in wake of investigative report
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from heyWhatsay@slrpnk.net on 21 Jul 11:44
comments (4)
in cybersecurity@sh.itjust.works from heyWhatsay@slrpnk.net on 21 Jul 11:44
comments (4)
3-line exploit revealed for critical NVIDIA Container Toolkit flaw | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 11:33
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jul 11:33
comments (1)
I want to make games someday but where do i start and what should i learn?
in programming@programming.dev from GrumpyCat@leminal.space on 20 Jul 23:34
comments (15)
in programming@programming.dev from GrumpyCat@leminal.space on 20 Jul 23:34
comments (15)
Did you know that Google provides a free API to retrieve the favicon for any website?
in programming@programming.dev from Pro@programming.dev on 20 Jul 16:24
comments (20)
in programming@programming.dev from Pro@programming.dev on 20 Jul 16:24
comments (20)
“I noticed a clear violation of our contributing guidelines”
(github.com)
in programming@programming.dev from Pro@programming.dev on 20 Jul 16:20
comments (9)
in programming@programming.dev from Pro@programming.dev on 20 Jul 16:20
comments (9)
The Big OOPs: Anatomy of a Thirty-five-year Mistake [Casey Muratori]
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 19 Jul 02:44
comments (4)
in programming@programming.dev from cm0002@lemmy.world on 19 Jul 02:44
comments (4)
Study finds AI tools made open source software developers 19 percent slower
(arstechnica.com)
in programming@programming.dev from Aatube@kbin.melroy.org on 19 Jul 02:23
comments (0)
in programming@programming.dev from Aatube@kbin.melroy.org on 19 Jul 02:23
comments (0)
This Week in Rust 608 · This Week in Rust
(this-week-in-rust.org)
in rust@lemmy.ml from dessalines@lemmy.ml on 18 Jul 03:04
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from dessalines@lemmy.ml on 18 Jul 03:04
comments (0)
dupe: rust@programming.dev (0)
Fixed Points and Strike Mandates - Paul Khuong: some Lisp
(pvk.ca)
in programming@programming.dev from shape_warrior_t@programming.dev on 19 Jul 01:02
comments (0)
in programming@programming.dev from shape_warrior_t@programming.dev on 19 Jul 01:02
comments (0)
The ASUS Dumpster Fire
in cybersecurity@sh.itjust.works from recursive_recursion@piefed.ca on 18 Jul 22:43
comments (6)
in cybersecurity@sh.itjust.works from recursive_recursion@piefed.ca on 18 Jul 22:43
comments (6)
Cursed knowledge we have learned as a result of building Immich that we wish we never knew.
(immich.app)
in programming@programming.dev from Pro@programming.dev on 18 Jul 21:55
comments (57)
in programming@programming.dev from Pro@programming.dev on 18 Jul 21:55
comments (57)
Spain: Chinese company Huawei must not be allowed access to wiretap data in 'normalisation of censorship and surveillance', rights group says
(www.article19.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Jul 16:47
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Jul 16:47
comments (1)
In neovim under wayland how do you guys copy and paste things?
in programming@programming.dev from jeena@piefed.jeena.net on 18 Jul 15:15
comments (14)
in programming@programming.dev from jeena@piefed.jeena.net on 18 Jul 15:15
comments (14)
US aims to ban Chinese technology in undersea telecommunications cables over security concerns
(www.reuters.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Jul 14:19
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Jul 14:19
comments (0)
Russia’s war against Ukraine, China’s coercive actions toward Taiwan very likely 'primary drivers' of state-linked sabotage targeting submarine cable infrastructure, report says
(www.recordedfuture.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 18 Jul 13:28
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 18 Jul 13:28
comments (0)
Can somebody explain the graphics stack? Vulkan, OpenGL, Magma, DirectX, SDL, Metal, Mesa, ... wat?
in programming@programming.dev from onlinepersona@programming.dev on 18 Jul 11:59
comments (26)
in programming@programming.dev from onlinepersona@programming.dev on 18 Jul 11:59
comments (26)
How I build software quickly
(evanhahn.com)
in programming@programming.dev from learnbyexample@programming.dev on 18 Jul 11:53
comments (8)
in programming@programming.dev from learnbyexample@programming.dev on 18 Jul 11:53
comments (8)
Most Important Advice After 1.5yrs @Meta
in programming@programming.dev from OsrsNeedsF2P@lemmy.ml on 18 Jul 06:42
comments (8)
in programming@programming.dev from OsrsNeedsF2P@lemmy.ml on 18 Jul 06:42
comments (8)
Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
(securityaffairs.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Jul 05:11
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Jul 05:11
comments (0)
Helix Editor Release 25.07 Highlights
(helix-editor.com)
in rust@lemmy.ml from dessalines@lemmy.ml on 16 Jul 23:35
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from dessalines@lemmy.ml on 16 Jul 23:35
comments (0)
dupe: rust@programming.dev (0)
GCC Front-End For Rust - June 2025 Monthly report
(rust-gcc.github.io)
in rust@programming.dev from cm0002@lemmy.world on 17 Jul 20:51
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 17 Jul 20:51
comments (0)
Watch out, another max-severity Cisco bug on the loose
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 17 Jul 19:15
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 17 Jul 19:15
comments (0)
The Invisible Risks of Insecure Chinese Surveillance Cameras
(chinaobservers.eu)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 17 Jul 17:15
comments (4)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 17 Jul 17:15
comments (4)
‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach
(www.itpro.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 17 Jul 16:30
comments (14)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 17 Jul 16:30
comments (14)
Teams Call to Ransomware: Matanbuchus 3.0 MaaS Levels Up
(www.morphisec.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:42
comments (1)
Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
(www.kyivpost.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:33
comments (0)
Co-op boss says sorry to 6.5m people who had data stolen in hack
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:26
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:26
comments (6)
Compumedics Ransomware Attack Led to Data Breach Impacting 318,000 - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:18
comments (0)
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:09
comments (0)
CyberArk: Rise in Machine Identities Poses New Risks
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 12:01
comments (0)
Louis Vuitton says regional data breaches tied to same cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 11:57
comments (0)
New Fortinet FortiWeb hacks likely linked to public RCE exploits
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jul 11:49
comments (0)
GhostContainer backdoor for Exchange servers
(securelist.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 17 Jul 10:06
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 17 Jul 10:06
comments (0)
gocryptfs - Encrypted overlay filesystem written in Go (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:50
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:50
comments (1)
Generate Go client and server boilerplate from OpenAPI 3 specifications (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:50
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:50
comments (0)
Learn Go with Tests (Golang)
(quii.gitbook.io)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:47
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:47
comments (0)
A deep dive into deeply recursive Go
(mattermost.com)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:46
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:46
comments (1)
You don't need testify/assert (Golang)
(antonz.org)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:38
comments (4)
in golang@programming.dev from cm0002@lemmy.world on 16 Jul 23:38
comments (4)
Google finds custom backdoor being installed on SonicWall network devices
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 16 Jul 21:42
comments (3)
in cybersecurity@sh.itjust.works from PhilipTheBucket@quokk.au on 16 Jul 21:42
comments (3)
Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 19:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 19:24
comments (0)
Europol and Eurojust disrupt pro-Russian hacktivist group NoName057(16) that has claimed responsibility for 1,000+ DDoS attacks since 2022, and make two arrests
(www.eurojust.europa.eu)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jul 18:23
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jul 18:23
comments (0)
Frontend Language Feature Matrix
in programming@programming.dev from mint_lang@programming.dev on 16 Jul 15:26
comments (32)
in programming@programming.dev from mint_lang@programming.dev on 16 Jul 15:26
comments (32)
Zyxel security advisory for path traversal vulnerability in APs | Zyxel Networks
(www.zyxel.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:42
comments (0)
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
(zimperium.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:33
comments (0)
Hyper-volumetric DDoS attacks skyrocket: Cloudflare’s 2025 Q2 DDoS threat report
(blog.cloudflare.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:25
comments (0)
Insecure Shopify plugin exposed hundreds of stores| Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:17
comments (1)
CISA adds serious Wing FTP Server vulnerability to must-fix list - iTnews
(www.itnews.com.au)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:10
comments (0)
Threat Actors Use SVG Smuggling for Browser-Native Redirection - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 12:02
comments (0)
Marks & Spencer hackers hit US retailer Belk | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 11:57
comments (0)
US National Guard unit was 'extensively' hacked by Salt Typhoon in 2024, memo says | Reuters
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 11:50
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 11:50
comments (4)
A Little-Known Microsoft Program Could Expose the U.S. Defense Department to Chinese Hackers
(www.propublica.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jul 09:41
comments (2)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jul 09:41
comments (2)
Stay Out Of My (Project) $HOME
(jackson.dev)
in programming@programming.dev from patrick@lemmy.bestiver.se on 16 Jul 02:02
comments (19)
in programming@programming.dev from patrick@lemmy.bestiver.se on 16 Jul 02:02
comments (19)
The FIPS 140-3 Go Cryptographic Module
(go.dev)
in golang@programming.dev from nemeski@mander.xyz on 16 Jul 01:50
comments (0)
in golang@programming.dev from nemeski@mander.xyz on 16 Jul 01:50
comments (0)
How thorough is this testing and review process? Am I understanding this correctly that they only review portions of the code, on top of function & security testing?
(elections.ny.gov)
in programming@programming.dev from Gates9@sh.itjust.works on 15 Jul 15:48
comments (3)
in programming@programming.dev from Gates9@sh.itjust.works on 15 Jul 15:48
comments (3)
Writing a package manager
(antonz.org)
in programming@programming.dev from cm0002@lemmy.world on 15 Jul 14:12
comments (11)
in programming@programming.dev from cm0002@lemmy.world on 15 Jul 14:12
comments (11)
North Korea-linked actors spread XORIndex malware via 67 malicious npm packages
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 13:00
comments (0)
MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:56
comments (0)
OpenAI's ChatGPT-powered browser is codenamed 'Aura'
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:48
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:48
comments (10)
New Grok AI model surprises experts by checking Elon Musk’s views before answering - Ars Technica
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:40
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:40
comments (4)
UK launches vulnerability research program for external experts
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:32
comments (0)
Chasing Ghosts Over RDP: Lateral Movement in Tiny Bitmaps | by Mat Cyb3rF0x Fuchs | Jul, 2025 | Medium
(medium.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:25
comments (0)
AsyncRAT evolves as ESET tracks its most popular malware forks - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:16
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:16
comments (5)
Interlock ransomware adopts FileFix method to deliver malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jul 12:08
comments (0)
Replicube: 3D shader puzzle game
(replicube.xyz)
in programming@programming.dev from who@feddit.org on 14 Jul 23:18
comments (0)
in programming@programming.dev from who@feddit.org on 14 Jul 23:18
comments (0)
Indian Police Raid Tech Support Scam Call Center
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 19:18
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 19:18
comments (4)
Filch Stealer: A new infostealer leveraging old techniques
(www.rapid7.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 14 Jul 19:07
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 14 Jul 19:07
comments (0)
Everything web based
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 14 Jul 18:57
comments (45)
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 14 Jul 18:57
comments (45)
Interlock Ransomware Unleashes New RAT in Widespread Campaign - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 17:25
comments (0)
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 17:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 17:16
comments (0)
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 14 Jul 14:34
comments (5)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 14 Jul 14:34
comments (5)
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 14:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 14:16
comments (0)
Global Louis Vuitton data breach impacts UK, South Korea, and Turkey
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 14:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 14:10
comments (0)
Google Gemini flaw hijacks email summaries for phishing
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 14:02
comments (0)
Which is the best way to learn Go?
in golang@programming.dev from MortySmith@programming.dev on 14 Jul 14:00
comments (5)
in golang@programming.dev from MortySmith@programming.dev on 14 Jul 14:00
comments (5)
Cyber-Insurance Premiums Drop, but Coverage Is Key
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 13:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 13:57
comments (0)
Windows 10 KB5062554 update breaks emoji panel search feature
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 13:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 13:48
comments (0)
Business Logic Vulnerability in Dell’s Payment API — Reported via Bugcrowd | by Yeswehack | May, 2025 | InfoSec Write-ups
(infosecwriteups.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 12:01
comments (0)
Alabama city hack exposed financial data, citizens | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 11:50
comments (0)
Dark Web Profile: Arkana Ransomware - SOCRadar® Cyber Intelligence Inc.
(socradar.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 11:41
comments (0)
Ransomware Delivered Through GitHub: A PowerShell-Powered Attack
(www.sonicwall.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jul 11:32
comments (0)
Introduction - Steve's Tutorial on jujutsu, an alternative front-end to git
(steveklabnik.github.io)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 14 Jul 03:56
comments (10)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 14 Jul 03:56
comments (10)
Programming Extensible Data Types in Rust with CGP - Part 3: Implementing Extensible Records
(contextgeneric.dev)
in rust@programming.dev from cm0002@programming.dev on 14 Jul 03:55
comments (1)
in rust@programming.dev from cm0002@programming.dev on 14 Jul 03:55
comments (1)
Zig's New Async I/O
(kristoff.it)
in programming@programming.dev from who@feddit.org on 13 Jul 18:34
comments (0)
in programming@programming.dev from who@feddit.org on 13 Jul 18:34
comments (0)
AI coders think they’re 20% faster — but they’re actually 19% slower
(pivot-to-ai.com)
in programming@programming.dev from cm0002@lemmy.cafe on 12 Jul 16:36
comments (96)
in programming@programming.dev from cm0002@lemmy.cafe on 12 Jul 16:36
comments (96)
Patterns for Modeling Overlapping Variant Data in Rust
(mcmah309.github.io)
in rust@programming.dev from shape_warrior_t@programming.dev on 12 Jul 15:57
comments (6)
in rust@programming.dev from shape_warrior_t@programming.dev on 12 Jul 15:57
comments (6)
crates.io: development update
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 12 Jul 02:15
comments (1)
in rust@programming.dev from nemeski@mander.xyz on 12 Jul 02:15
comments (1)
SQLite alternative with encryption
in programming@programming.dev from Zenlix@lemmy.ml on 11 Jul 23:42
comments (17)
in programming@programming.dev from Zenlix@lemmy.ml on 11 Jul 23:42
comments (17)
new Date("wtf")
(jsdate.wtf)
in programming@programming.dev from Sheldan@programming.dev on 11 Jul 21:37
comments (53)
in programming@programming.dev from Sheldan@programming.dev on 11 Jul 21:37
comments (53)
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 17:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 17:18
comments (0)
Measuring the Impact of Early-2025 AI on Experienced Open-Source Developer Productivity
(metr.org)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 11 Jul 14:32
comments (11)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 11 Jul 14:32
comments (11)
Study (N=16) finds AI (Cursor/Claude) slows development
in programming@programming.dev from jay@beehaw.org on 11 Jul 14:29
comments (15)
in programming@programming.dev from jay@beehaw.org on 11 Jul 14:29
comments (15)
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 14:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 14:18
comments (0)
Rowhammer Attack Demonstrated Against Nvidia GPU - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 14:09
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 14:09
comments (4)
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 14:02
comments (0)
TikTok Faces Fresh European Privacy Investigation Over China Data Transfers - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 13:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 13:56
comments (0)
Windows 11 now uses JScript9Legacy engine for improved security
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 13:50
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 13:50
comments (1)
UK Arrests Four in ‘Scattered Spider’ Ransom Group – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 13:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 13:32
comments (0)
New AI Malware PoC Reliably Evades Microsoft Defender
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:49
comments (0)
SafePay Ransomware Uses RDP and VPN Access to Infiltrate Organizational Networks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:41
comments (0)
Customer, Employee Data Exposed in Nippon Steel Breach
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:34
comments (0)
Palo Alto Networks GlobalProtect Vulnerability Enabling Root-Level Access
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:25
comments (0)
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:17
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:17
comments (3)
GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
(www.greynoise.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:09
comments (0)
McDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekers
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:02
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 12:02
comments (7)
Seven Healthcare Organizations Added to Ransomware Groups’ Data Leak Sites
(www.hipaajournal.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:57
comments (0)
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:49
comments (0)
eSIM Hack Allows for Cloning, Spying - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:42
comments (1)
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:34
comments (0)
PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jul 11:25
comments (1)
The Solidity Language open-source package was used in a $500,000 crypto heist
(securelist.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jul 16:49
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jul 16:49
comments (0)
The Jank programming language
(jank-lang.org)
in programming@programming.dev from cm0002@lemmy.cafe on 10 Jul 15:09
comments (11)
in programming@programming.dev from cm0002@lemmy.cafe on 10 Jul 15:09
comments (11)
More than $40 million stolen from GMX crypto platform | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 15:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 15:01
comments (0)
5 Takeaways: Senate Banking Committee Hearing on Digital Assets
(www.chainalysis.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:56
comments (0)
CVE-2025-6514 Threatens LLM clients
(jfrog.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:50
comments (0)
A new era of Stack Overflow.
(stackoverflow.blog)
in programming@programming.dev from Pro@programming.dev on 10 Jul 14:45
comments (14)
in programming@programming.dev from Pro@programming.dev on 10 Jul 14:45
comments (14)
Export to PDF allows local file inclusion/path traversal in Microsoft 365 - hn security
(security.humanativaspa.it)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:41
comments (0)
GitHub Abused to Spread Malware Disguised as Free VPN - CYFIRMA
(www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:34
comments (0)
Server with Rockerbox Tax Firm Data Exposed 286GB of Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:27
comments (0)
Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West
(www.morphisec.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:18
comments (0)
North American APT Uses Exchange Zero-Day to Attack China
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:09
comments (0)
SatanLock Next in Line for Ransomware Group Shutdowns
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 14:02
comments (0)
Ransomware Attack Stops Nova Scotia Power Meter Readings - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 13:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 13:59
comments (0)
A Vulnerability in FortiWeb Could Allow for SQL Injection
(www.cisecurity.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 13:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jul 13:49
comments (0)
This Week in Rust 607
(this-week-in-rust.org)
in rust@programming.dev from mrbn@lemmy.ca on 10 Jul 13:34
comments (0)
in rust@programming.dev from mrbn@lemmy.ca on 10 Jul 13:34
comments (0)
The Tree Borrows paper is finally published
(www.ralfj.de)
in rust@programming.dev from CodiUnicorn@programming.dev on 10 Jul 07:22
comments (1)
in rust@programming.dev from CodiUnicorn@programming.dev on 10 Jul 07:22
comments (1)
The Czech Republic bans DeepSeek in state administration over cybersecurity concerns
(apnews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 10 Jul 05:53
comments (2)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 10 Jul 05:53
comments (2)
Qantas tells customers what data was stolen during break-in
(www.theregister.com)
in cybersecurity@sh.itjust.works from vk6flab@lemmy.radio on 10 Jul 03:44
comments (0)
in cybersecurity@sh.itjust.works from vk6flab@lemmy.radio on 10 Jul 03:44
comments (0)
yt-dlp cli bindings for Go
(github.com)
in golang@programming.dev from cm0002@programming.dev on 09 Jul 21:46
comments (0)
in golang@programming.dev from cm0002@programming.dev on 09 Jul 21:46
comments (0)
What’s blocking students from building real-world projects in college?
in programming@programming.dev from howdy_asta@lemmy.world on 09 Jul 14:49
comments (14)
in programming@programming.dev from howdy_asta@lemmy.world on 09 Jul 14:49
comments (14)
In Praise of the Contrarian Stack
(hackers.pub)
in programming@programming.dev from hongminhee@lemmy.ml on 09 Jul 11:18
comments (12)
in programming@programming.dev from hongminhee@lemmy.ml on 09 Jul 11:18
comments (12)
I wrote my PhD Thesis in Typst
(fransskarman.com)
in programming@programming.dev from Pro@programming.dev on 09 Jul 10:31
comments (4)
in programming@programming.dev from Pro@programming.dev on 09 Jul 10:31
comments (4)
Announcing TypeScript 5.9 Beta
(devblogs.microsoft.com)
in programming@programming.dev from BlackEco@lemmy.blackeco.com on 09 Jul 08:28
comments (0)
in programming@programming.dev from BlackEco@lemmy.blackeco.com on 09 Jul 08:28
comments (0)
Browser hijacking campaign infects 2.3M Chrome, Edge users
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Jul 22:21
comments (7)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Jul 22:21
comments (7)
Malicious Open Source Packages Surge 188% Annually - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 19:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 19:33
comments (0)
Android malware Anatsa infiltrates Google Play to target US banks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 19:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 19:25
comments (0)
Over 500 Scattered Spider Phishing Domains Poised to Target Multiple I - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 19:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 19:18
comments (0)
Git security vulnerabilities announced
(github.blog)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 08 Jul 18:57
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 08 Jul 18:57
comments (0)
Employee gets $920 for credentials used in $140 million bank heist
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:50
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:50
comments (1)
4 Critical Steps in Advance of 47-Day SSL/TLS Certificates
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:40
comments (0)
Ransomware negotiator investigated over criminal gang kickbacks | Malwarebytes
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:34
comments (0)
VenusTech and Salt Typhoon Breach Sheds Light on China's Covert Cyber Mercenary Networks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:24
comments (0)
DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:19
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:19
comments (0)
Malware Attacks on Android Devices Surge in Q2, Driven by Banking Trojans and Spyware
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 15:08
comments (0)
Surmodics & Kentfield Hospital Fall Victim to Cyberattacks
(www.hipaajournal.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 12:48
comments (0)
Chrome Store Features Extension Poisoned With Sophisticated Spyware
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 12:43
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jul 12:43
comments (3)