programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
mtlog - Message Template Logging for Go
(mtlog.dev)
in golang@programming.dev from cm0002@lemmy.world on 04 Sep 23:11
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 04 Sep 23:11
comments (0)
Rich Interactive Widgets for Terminal UIs in Golang
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 04 Sep 23:11
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 04 Sep 23:11
comments (0)
AI hacking. Downloading images can allow your computer to be hijacked
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 20:50
comments (2)
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 20:50
comments (2)
Supply chain audit tool
in golang@programming.dev from Sxan@piefed.zip on 04 Sep 15:49
comments (0)
in golang@programming.dev from Sxan@piefed.zip on 04 Sep 15:49
comments (0)
Where's the Shovelware? Why AI Coding Claims Don't Add Up
(substack.com)
in programming@programming.dev from azdle@news.idlestate.org on 04 Sep 00:17
comments (36)
in programming@programming.dev from azdle@news.idlestate.org on 04 Sep 00:17
comments (36)
Benchmarks for Golang SQLite Drivers
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 03 Sep 22:47
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 03 Sep 22:47
comments (1)
Welcoming the Rust Innovation Lab
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 03 Sep 20:23
comments (0)
in rust@programming.dev from nemeski@mander.xyz on 03 Sep 20:23
comments (0)
Microsoft Releases Historic 6502 BASIC - Microsoft Open Source Blog
(opensource.microsoft.com)
in programming@programming.dev from Burqueno@lemmy.world on 03 Sep 18:29
comments (5)
in programming@programming.dev from Burqueno@lemmy.world on 03 Sep 18:29
comments (5)
Update deku_string v0.4.0
(crates.io)
in rust@programming.dev from blazebra@programming.dev on 03 Sep 17:15
comments (0)
in rust@programming.dev from blazebra@programming.dev on 03 Sep 17:15
comments (0)
How was your experience with SailsJS?
in programming@programming.dev from lena@gregtech.eu on 03 Sep 17:14
comments (0)
in programming@programming.dev from lena@gregtech.eu on 03 Sep 17:14
comments (0)
Asterinas 0.16.0 Blogpost - Rust Kernel demos baremetal boot for the first time
(asterinas.github.io)
in rust@programming.dev from Auth@lemmy.world on 02 Sep 22:05
comments (0)
in rust@programming.dev from Auth@lemmy.world on 02 Sep 22:05
comments (0)
No, you don't want to hire "the best engineers" — I think this might be the meanest thing I've ever written.
(www.otherbranch.com)
in programming@programming.dev from Pro@programming.dev on 02 Sep 16:34
comments (9)
in programming@programming.dev from Pro@programming.dev on 02 Sep 16:34
comments (9)
Next.js Is Infuriating
(blog.meca.sh)
in programming@programming.dev from tyteen4a03@lemmy.zip on 02 Sep 15:45
comments (1)
in programming@programming.dev from tyteen4a03@lemmy.zip on 02 Sep 15:45
comments (1)
Wikidata and Mundaneum - The Triumph of the Commons
(schmud.de)
in programming@programming.dev from schmudde@beehaw.org on 02 Sep 15:17
comments (0)
in programming@programming.dev from schmudde@beehaw.org on 02 Sep 15:17
comments (0)
My Pixel 10 warned me 8 times in 30-minutes that there was a rogue connection made. Deeply concerning
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 00:26
comments (64)
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 00:26
comments (64)
Default Methods in Go (Golang)
(mcyoung.xyz)
in golang@programming.dev from cm0002@lemmy.world on 01 Sep 22:56
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 01 Sep 22:56
comments (0)
Faster linking times with 1.90.0 stable on Linux using the LLD linker
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 01 Sep 20:48
comments (3)
in rust@programming.dev from nemeski@mander.xyz on 01 Sep 20:48
comments (3)
[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method
(www.usenix.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 19:47
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 19:47
comments (0)
Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS
(thenewstack.io)
in programming@programming.dev from who@feddit.org on 01 Sep 19:16
comments (26)
in programming@programming.dev from who@feddit.org on 01 Sep 19:16
comments (26)
Which is more important to you in a language, feature richness or documentation quality?
in programming@programming.dev from Sunsofold@lemmings.world on 01 Sep 18:57
comments (17)
in programming@programming.dev from Sunsofold@lemmings.world on 01 Sep 18:57
comments (17)
DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally
(www.netscout.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 16:43
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 16:43
comments (0)
things rust shipped without (2015)
(graydon2.dreamwidth.org)
in rust@programming.dev from azdle@news.idlestate.org on 01 Sep 15:11
comments (14)
in rust@programming.dev from azdle@news.idlestate.org on 01 Sep 15:11
comments (14)
I just created an experimental Node.js Framework.
(www.npmjs.com)
in programming@programming.dev from SowmyaAce786@programming.dev on 01 Sep 09:26
comments (5)
in programming@programming.dev from SowmyaAce786@programming.dev on 01 Sep 09:26
comments (5)
What's your experience with Nim?
in programming@programming.dev from popcar2@programming.dev on 31 Aug 10:27
comments (68)
in programming@programming.dev from popcar2@programming.dev on 31 Aug 10:27
comments (68)
Whatmade is a Linux daemon that monitors user-specified directories and records which process created each file
in programming@programming.dev from Lembot_0004@discuss.online on 31 Aug 08:51
comments (13)
in programming@programming.dev from Lembot_0004@discuss.online on 31 Aug 08:51
comments (13)
The Koka programming language
(lwn.net)
in programming@programming.dev from cm0002@lemmy.world on 31 Aug 01:43
comments (11)
in programming@programming.dev from cm0002@lemmy.world on 31 Aug 01:43
comments (11)
The Most Minimal Kanban
(fd93.me)
in programming@programming.dev from fd93@programming.dev on 30 Aug 23:39
comments (3)
in programming@programming.dev from fd93@programming.dev on 30 Aug 23:39
comments (3)
GitHub - Rolv-Apneseth/clipvault: Clipboard history manager for Wayland, inspired by cliphist
(github.com)
in rust@programming.dev from _hovi_@lemmy.world on 30 Aug 22:31
comments (2)
in rust@programming.dev from _hovi_@lemmy.world on 30 Aug 22:31
comments (2)
Pizza Intelligence - How Pentagon pizza orders correlate with big news
(pizzint.watch)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 15:13
comments (7)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 15:13
comments (7)
DHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access Federal Emergency Management Agency (FEMA) networks
(www.dhs.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 12:34
comments (10)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 12:34
comments (10)
Managarr v0.6.0 is Out and now supports Themes, Vim keybindings, custom API headers, and more!
(github.com)
in rust@lemmy.ml from aclarke@lemmy.world on 29 Aug 23:32
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from aclarke@lemmy.world on 29 Aug 23:32
comments (0)
dupe: rust@programming.dev (0)
This Week in Rust 614 · This Week in Rust
(this-week-in-rust.org)
in rust@lemmy.ml from dessalines@lemmy.ml on 29 Aug 00:07
comments (0)
dupe: rust@programming.dev (0)
in rust@lemmy.ml from dessalines@lemmy.ml on 29 Aug 00:07
comments (0)
dupe: rust@programming.dev (0)
Managarr v0.6.0 is Out and now supports Themes, Vim keybindings, custom API headers, and more!
in rust@programming.dev from aclarke@lemmy.world on 29 Aug 23:31
comments (1)
in rust@programming.dev from aclarke@lemmy.world on 29 Aug 23:31
comments (1)
Charm.land business model
(charm.land)
in programming@programming.dev from wiegell@feddit.dk on 29 Aug 21:54
comments (2)
in programming@programming.dev from wiegell@feddit.dk on 29 Aug 21:54
comments (2)
Deno vs Oracle: The ugly custody battle for JavaScript…
(www.youtube.com)
in programming@programming.dev from mesamunefire@piefed.social on 29 Aug 20:42
comments (6)
in programming@programming.dev from mesamunefire@piefed.social on 29 Aug 20:42
comments (6)
AI slop attacks on the curl project - Daniel Stenberg
(www.youtube.com)
in programming@programming.dev from mesamunefire@piefed.social on 29 Aug 20:35
comments (0)
in programming@programming.dev from mesamunefire@piefed.social on 29 Aug 20:35
comments (0)
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 20:05
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 20:05
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:46
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:46
comments (0)
gorush - A push notification server written in Go (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 29 Aug 13:55
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 29 Aug 13:55
comments (0)
Watermill - Building event-driven applications the easy way in Go (Golang)
(watermill.io)
in golang@programming.dev from cm0002@lemmy.world on 29 Aug 13:54
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 29 Aug 13:54
comments (0)
I Hacked BellaBot and Every Robot from China's Biggest Robotics Company (Pudu Only Fixed It When I Told Their Clients)
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 29 Aug 13:29
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 29 Aug 13:29
comments (0)
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:07
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:07
comments (1)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
Google is getting ready to 'hack back' as US considers shifting from cyber defense to offense — new 'Scam Farms' bill opens up new retaliatory hacking actions
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:02
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:02
comments (0)
Testing Time (and other asynchronicities)
(go.dev)
in golang@programming.dev from nemeski@mander.xyz on 28 Aug 21:59
comments (0)
in golang@programming.dev from nemeski@mander.xyz on 28 Aug 21:59
comments (0)
The FBI and agencies in the UK, Canada, and others warn that a Chinese hacking campaign targeting US telecoms has expanded to more countries and US companies
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 28 Aug 08:52
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 28 Aug 08:52
comments (0)
Rust for Everyone! (video)
(www.youtube.com)
in rust@programming.dev from ildar@programming.dev on 28 Aug 05:57
comments (1)
in rust@programming.dev from ildar@programming.dev on 28 Aug 05:57
comments (1)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks
(www.ncsc.gov.uk)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
Vulnerable Claude code in GitHub action led to stolen NPM keys
(github.com)
in programming@programming.dev from qqq@lemmy.world on 28 Aug 00:22
comments (2)
dupe: cybersecurity@sh.itjust.works (0)
in programming@programming.dev from qqq@lemmy.world on 28 Aug 00:22
comments (2)
dupe: cybersecurity@sh.itjust.works (0)
Russia-based Yandex employee oversees open-source software approved for Department of Defense use
(huntedlabs.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 18:16
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 18:16
comments (1)
The LibreOffice Conference in Budapest will start in one week 🗓️.
(conference.libreoffice.org)
in programming@programming.dev from Davriellelouna@lemmy.world on 27 Aug 16:15
comments (0)
in programming@programming.dev from Davriellelouna@lemmy.world on 27 Aug 16:15
comments (0)
Anthropic: Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme
(www.anthropic.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:03
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:03
comments (0)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says
(www.nytimes.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 27 Aug 08:15
comments (1)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 27 Aug 08:15
comments (1)
ESET Research: The first AI-powered(LLM) ransomware has been discovered- PromptLock.
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 21:12
comments (7)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 21:12
comments (7)
BeatTheHash - A Hash Guessing Game Inspired by xkcd
(beatthehash.com)
in programming@programming.dev from QuantumTickle@lemmy.zip on 26 Aug 21:06
comments (3)
in programming@programming.dev from QuantumTickle@lemmy.zip on 26 Aug 21:06
comments (3)
Malware-ridden apps made it into Google's Play Store, scored 19 million downloads
(www.theregister.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 26 Aug 13:27
comments (5)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 26 Aug 13:27
comments (5)
Cyberattack on state systems bring Nevada’s official websites & phone lines down; officials rely on social media to issue updates
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:23
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:23
comments (0)
Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats
(cloud.google.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:22
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:22
comments (0)
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 26 Aug 10:48
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 26 Aug 10:48
comments (0)
Building Ebitengine Games for Web Browsers (Tutorial)
(youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 26 Aug 01:27
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 26 Aug 01:27
comments (0)
Long Names Are Long
(journal.stuffwithstuff.com)
in programming@programming.dev from shape_warrior_t@programming.dev on 25 Aug 20:12
comments (3)
in programming@programming.dev from shape_warrior_t@programming.dev on 25 Aug 20:12
comments (3)
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 25 Aug 13:42
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 25 Aug 13:42
comments (0)
Stack Overflow data reveals the hidden productivity tax of ‘almost right’ AI code
(venturebeat.com)
in programming@programming.dev from limer@lemmy.ml on 25 Aug 13:02
comments (9)
in programming@programming.dev from limer@lemmy.ml on 25 Aug 13:02
comments (9)
ghrc.io Appears to be Malicious
(bmitch.net)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 25 Aug 03:31
comments (0)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 25 Aug 03:31
comments (0)
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 24 Aug 21:53
comments (4)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 24 Aug 21:53
comments (4)
Can you recommend a book that teaches you about cybersecurity?
in cybersecurity@sh.itjust.works from kennedy@lemmy.dbzer0.com on 24 Aug 14:50
comments (12)
in cybersecurity@sh.itjust.works from kennedy@lemmy.dbzer0.com on 24 Aug 14:50
comments (12)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Aug 20:35
comments (29)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Aug 20:35
comments (29)
This month in Servo: new image formats, canvas backends, automation, and more!
(servo.org)
in programming@programming.dev from Pro@programming.dev on 23 Aug 08:44
comments (0)
in programming@programming.dev from Pro@programming.dev on 23 Aug 08:44
comments (0)
Ergonomic errors in Rust: Stackerror
(gmcgoldr.github.io)
in rust@programming.dev from alienscience@programming.dev on 23 Aug 06:17
comments (4)
in rust@programming.dev from alienscience@programming.dev on 23 Aug 06:17
comments (4)
Data I/O ransomware attack ‘temporarily impacted’ operations
(www.theregister.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 23 Aug 05:15
comments (0)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 23 Aug 05:15
comments (0)
GrapheneOS: Another contributor attacked & banned by Daniel Micay
(tech.michaelaltfield.net)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 19 Aug 16:37
comments (0)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 19 Aug 16:37
comments (0)
Hackers access data of 850,000 Orange Belgium customers
(www.euractiv.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
Colt Confirms Customer Data Stolen in Ransomware Attack
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:11
comments (0)
Agit-Flow and git-repo
(git-repo.info)
in programming@programming.dev from cm0002@piefed.world on 22 Aug 00:43
comments (0)
in programming@programming.dev from cm0002@piefed.world on 22 Aug 00:43
comments (0)
rustc_codegen_gcc: Progress Report #37
(blog.antoyo.xyz)
in rust@programming.dev from antoyo@programming.dev on 21 Aug 23:40
comments (3)
in rust@programming.dev from antoyo@programming.dev on 21 Aug 23:40
comments (3)
An Interactive Guide to SVG Paths
(www.joshwcomeau.com)
in programming@programming.dev from cm0002@piefed.world on 21 Aug 19:29
comments (0)
in programming@programming.dev from cm0002@piefed.world on 21 Aug 19:29
comments (0)
Heapless (data structures for embedded) v0.9.1 has been released!
(blog.rust-embedded.org)
in rust@programming.dev from sgued@programming.dev on 21 Aug 06:57
comments (11)
in rust@programming.dev from sgued@programming.dev on 21 Aug 06:57
comments (11)
Can I use AI for the code review?
in programming@programming.dev from Lembot_0004@discuss.online on 21 Aug 06:04
comments (21)
in programming@programming.dev from Lembot_0004@discuss.online on 21 Aug 06:04
comments (21)
Dependabot now supports Rust toolchain updates
(github.blog)
in rust@programming.dev from nemeski@mander.xyz on 20 Aug 19:57
comments (0)
in rust@programming.dev from nemeski@mander.xyz on 20 Aug 19:57
comments (0)
Demoting x86_64-apple-darwin to Tier 2 with host tools
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 20 Aug 19:55
comments (2)
in rust@programming.dev from nemeski@mander.xyz on 20 Aug 19:55
comments (2)
Container-aware GOMAXPROCS
(go.dev)
in golang@programming.dev from nemeski@mander.xyz on 20 Aug 19:54
comments (2)
in golang@programming.dev from nemeski@mander.xyz on 20 Aug 19:54
comments (2)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (0)
Go 1.25 interactive tour
(antonz.org)
in golang@programming.dev from JustJack23@slrpnk.net on 20 Aug 17:15
comments (0)
in golang@programming.dev from JustJack23@slrpnk.net on 20 Aug 17:15
comments (0)
Lisp In 99 Lines Of C With TinyLisp
(hackaday.com)
in programming@programming.dev from mesamunefire@piefed.social on 20 Aug 16:10
comments (3)
in programming@programming.dev from mesamunefire@piefed.social on 20 Aug 16:10
comments (3)
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure
(www.ic3.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 14:43
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 14:43
comments (0)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks
(www.artificialintelligence-news.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:25
comments (2)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:25
comments (2)
Zero-Day Vulnerability allow attackers to steal users data Found in Password Managers( 1Password, Bitwarden, LastPass, Enpass, iCloud Passwords, and LogMeOnce remain unpatched— still vulnerable)
(marektoth.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 10:01
comments (8)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 10:01
comments (8)
Do not Interrupt Developers, Study Says
(shiftmag.dev)
in programming@programming.dev from SmartmanApps@programming.dev on 19 Aug 23:04
comments (80)
in programming@programming.dev from SmartmanApps@programming.dev on 19 Aug 23:04
comments (80)
Read the Following Manual
in programming@programming.dev from bestboyfriendintheworld@sh.itjust.works on 19 Aug 22:17
comments (78)
in programming@programming.dev from bestboyfriendintheworld@sh.itjust.works on 19 Aug 22:17
comments (78)
GitHub - Rolv-Apneseth/omaro: TUI for lobste.rs
(github.com)
in rust@programming.dev from _hovi_@lemmy.world on 19 Aug 19:14
comments (0)
in rust@programming.dev from _hovi_@lemmy.world on 19 Aug 19:14
comments (0)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe)
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 18:52
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 18:52
comments (0)
Does the AGPL license allows not disclosing the source of third party scripts (in)directly interacting with the main software?
in programming@programming.dev from Electricd@lemmybefree.net on 19 Aug 17:08
comments (18)
in programming@programming.dev from Electricd@lemmybefree.net on 19 Aug 17:08
comments (18)
ChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption for any CPU
(kerkour.com)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 19 Aug 15:48
comments (2)
in cryptography@lemmy.ml from cypherpunks@lemmy.ml on 19 Aug 15:48
comments (2)
Intel Outside: Hacking every Intel employee and various internal websites
(eaton-works.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 07:31
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 07:31
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools
(cybersrcc.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (1)
AI Can't Help You Write Well
(jade.ellis.link)
in programming@programming.dev from JadedBlueEyes@programming.dev on 18 Aug 21:21
comments (17)
in programming@programming.dev from JadedBlueEyes@programming.dev on 18 Aug 21:21
comments (17)
VimWiki: I write my notes in the terminal, like a monster
(tinkerbetter.tube)
in programming@programming.dev from mesamunefire@piefed.social on 18 Aug 17:31
comments (5)
in programming@programming.dev from mesamunefire@piefed.social on 18 Aug 17:31
comments (5)
Researcher to release exploit for full auth bypass on FortiWeb
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 17 Aug 23:48
comments (0)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 17 Aug 23:48
comments (0)
What Should I Use Instead of Github? - Codeberg Gitlab and BitBucket
(diode.zone)
in programming@programming.dev from mesamunefire@piefed.social on 17 Aug 20:11
comments (58)
in programming@programming.dev from mesamunefire@piefed.social on 17 Aug 20:11
comments (58)
Recto: In Case Programming Isn’t Hard Enough
(hackaday.com)
in programming@programming.dev from mesamunefire@piefed.social on 17 Aug 19:45
comments (4)
in programming@programming.dev from mesamunefire@piefed.social on 17 Aug 19:45
comments (4)
Let's write a macro in Rust - Part 1
(hackeryarn.com)
in rust@programming.dev from hackeryarn@lemmy.world on 17 Aug 17:03
comments (0)
in rust@programming.dev from hackeryarn@lemmy.world on 17 Aug 17:03
comments (0)
Citizen Lab director warns Black Hat security conference about authoritarian descent
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 17 Aug 10:33
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 17 Aug 10:33
comments (0)
Beyond Booleans - “bool expressions” in Lean, proposition, proof
(overreacted.io)
in programming@programming.dev from Kissaki@programming.dev on 17 Aug 08:01
comments (1)
in programming@programming.dev from Kissaki@programming.dev on 17 Aug 08:01
comments (1)
Applied Cryptography — Understanding Diffie-Hellman with Clocks
(appliedcryptography.page)
in programming@programming.dev from cm0002@piefed.world on 16 Aug 23:40
comments (1)
in programming@programming.dev from cm0002@piefed.world on 16 Aug 23:40
comments (1)
This Week in Rust 612
(this-week-in-rust.org)
in rust@programming.dev from cm0002@piefed.world on 16 Aug 23:38
comments (0)
in rust@programming.dev from cm0002@piefed.world on 16 Aug 23:38
comments (0)
Best C# IDE/Compiler for Linux?
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:07
comments (35)
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:07
comments (35)
Ignoring lemmyhate, are programmers really using AI to be more efficient?
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:02
comments (79)
in programming@programming.dev from bridgeenjoyer@sh.itjust.works on 15 Aug 16:02
comments (79)
Real-Time C/C++/Rust Build Visualizer ・ Daniel Hooper
(danielchasehooper.com)
in programming@programming.dev from ruffsl@programming.dev on 15 Aug 05:21
comments (1)
in programming@programming.dev from ruffsl@programming.dev on 15 Aug 05:21
comments (1)
[Help] Storage Optimization Algorithm
in programming@programming.dev from uninvitedguest@lemmy.ca on 15 Aug 03:37
comments (4)
in programming@programming.dev from uninvitedguest@lemmy.ca on 15 Aug 03:37
comments (4)
For $40, you can buy stolen police and government email accounts
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
New awesome version of deku_string
in rust@programming.dev from blazebra@programming.dev on 14 Aug 16:32
comments (1)
in rust@programming.dev from blazebra@programming.dev on 14 Aug 16:32
comments (1)
Malvertising campaign leads to PS1Bot, a multi-stage malware framework
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
Data leak could cut electricity to Mexico | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
Pennsylvania attorney general's email, site down after cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
Major HTTP flaw puts 24 million websites at risk | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (9)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (9)
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
Microsoft fixes "BadSuccessor" Kerberos vulnerability (CVE-2025-53779) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
Hackers Raid Dutch Lab, Stealing Data on 500,000 Patients - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:34
comments (0)
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:25
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:25
comments (2)
Home Office Phishing Scam Targets UK Immigration Sponsors - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:17
comments (0)
Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:10
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 14:10
comments (1)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition
(vreme.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 13:02
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 13:02
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks
(www.aspistrategist.org.au)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 04:51
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 04:51
comments (0)
Go 1.25 Released With Experimental GC Yielding 10~40% Overhead Reduction
(www.phoronix.com)
in golang@programming.dev from cm0002@piefed.world on 13 Aug 00:48
comments (1)
in golang@programming.dev from cm0002@piefed.world on 13 Aug 00:48
comments (1)
Russia Is Suspected to Be Behind Breach of Federal Court Filing System
(archive.ph)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 23:10
comments (0)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 23:10
comments (0)
Go 1.25 Release Notes - The Go Programming Language
(go.dev)
in golang@programming.dev from jwr1@kbin.earth on 12 Aug 23:02
comments (0)
in golang@programming.dev from jwr1@kbin.earth on 12 Aug 23:02
comments (0)
Saint Paul cyberattack linked to Interlock ransomware gang
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 17:02
comments (0)
Scattered Spider and ShinyHunters' Next Move: Leaking Data
(www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:58
comments (0)
ShinyHunters Unveils That BreachForums Taken by Law Enforcement Agencies, Now It Is a Honeypot
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 16:56
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 16:56
comments (1)
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises | Trend Micro (US)
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 16:48
comments (0)
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:41
comments (0)
Flaws in Major Automaker's Dealership Systems Allowed Car Hacking, Personal Data Theft - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:32
comments (0)
Over 29,000 Exchange servers unpatched against high-severity flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:25
comments (0)
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:16
comments (0)
Hackers steal Google Ads business contact data | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 12:09
comments (0)
Comby is a tool for searching and changing code structure
(comby.dev)
in programming@programming.dev from paequ2@lemmy.today on 12 Aug 07:24
comments (5)
in programming@programming.dev from paequ2@lemmy.today on 12 Aug 07:24
comments (5)
Effortless Rust Development with Nix | Devshells, Packaging & Beyond - YouTube
(youtube.com)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 21:08
comments (0)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 21:08
comments (0)
Bevy's Fifth Birthday
(bevy.org)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 20:37
comments (1)
in rust@programming.dev from ruffsl@programming.dev on 11 Aug 20:37
comments (1)
GitHub CEO to step down
(www.axios.com)
in programming@programming.dev from who@feddit.org on 11 Aug 18:46
comments (46)
in programming@programming.dev from who@feddit.org on 11 Aug 18:46
comments (46)
MuddyWater’s DarkBit ransomware cracked for free data recovery
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:26
comments (0)
Connex Credit Union data breach impacts 172,000 members
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 18:14
comments (0)
Building blocks for idiomatic Go pipelines
(antonz.org)
in golang@programming.dev from cm0002@lemmy.world on 11 Aug 16:30
comments (1)
in golang@programming.dev from cm0002@lemmy.world on 11 Aug 16:30
comments (1)
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:44
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:44
comments (6)
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscaler, and NetSkope
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 14:30
comments (0)
Data Dump From APT Actor Yields Clues to Attacker Capabilities
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:34
comments (0)
Ransomware Attacks Fall by Almost Half in Q2
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:26
comments (0)
Google Calendar invites let researchers hijack Gemini to leak user data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:17
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:17
comments (2)
U.S. Judiciary confirms breach of court electronic records service
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:09
comments (0)
Cancer care provider breach exposes 113K+ patients | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 12:01
comments (0)
GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:56
comments (0)
15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:48
comments (1)
Boeing, US Navy supplier Jamco Aerospace claimed in ransomware attack | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:42
comments (1)
WinRAR zero-day exploited to plant malware on archive extraction
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:33
comments (2)
Australian Regulator Sues Optus Over 2022 Data Breach
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 11:12
comments (0)
The inside story of the Telemessage saga, and how you can view the data
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 22:16
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 22:16
comments (0)
Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises
(julsimon.medium.com)
in programming@programming.dev from vermaterc@lemmy.ml on 10 Aug 10:38
comments (9)
in programming@programming.dev from vermaterc@lemmy.ml on 10 Aug 10:38
comments (9)
Do you love Open Source software? Want to turn your passion into a paid job 💵? LibreOffice is hiring a remote Paid Developer focusing on UI with initial emphasis on macOS, preferably full-time 📢
(blog.documentfoundation.org)
in programming@programming.dev from Davriellelouna@lemmy.world on 09 Aug 21:14
comments (3)
in programming@programming.dev from Davriellelouna@lemmy.world on 09 Aug 21:14
comments (3)
Rust 1.89 expands x86 support, stabilizes APIs, and downgrades macOS x86_64 support
(alternativeto.net)
in programming@programming.dev from tonytins@pawb.social on 09 Aug 01:01
comments (4)
in programming@programming.dev from tonytins@pawb.social on 09 Aug 01:01
comments (4)
Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds
(www.wired.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 00:08
comments (27)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 00:08
comments (27)
Is it fine if a website says "email already in use" before you hit submit?
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 22:14
comments (42)
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 22:14
comments (42)
Security Researchers found a way to trick Windows Hello authentication, but there is a simple fix - gHacks Tech News
(www.ghacks.net)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 15:57
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 15:57
comments (1)
IT-TOOLS - Collection of handy online tools for developers, with great UX
(it-tools.tech)
in programming@programming.dev from cm0002@lemmy.world on 08 Aug 14:10
comments (6)
in programming@programming.dev from cm0002@lemmy.world on 08 Aug 14:10
comments (6)
The 17-character code that runs the automotive world
(cardog.app)
in programming@programming.dev from Pro@programming.dev on 08 Aug 09:27
comments (3)
in programming@programming.dev from Pro@programming.dev on 08 Aug 09:27
comments (3)
🧪 Is your Go code really battle-tested?
(levelup.gitconnected.com)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 06:22
comments (0)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 06:22
comments (0)
🚀 Want to write cleaner, faster, and safer Go microservices in 2025?
(levelup.gitconnected.com)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 05:52
comments (1)
in golang@programming.dev from LF3551@lemmy.world on 08 Aug 05:52
comments (1)
Introducing PaperCache, an in-memory cache that can switch its eviction policy dynamically
(papercache.io)
in programming@programming.dev from papercache@programming.dev on 08 Aug 05:17
comments (0)
dupe: rust@programming.dev (8)
in programming@programming.dev from papercache@programming.dev on 08 Aug 05:17
comments (0)
dupe: rust@programming.dev (8)
A new worst coder has entered the chat: vibe coding without code knowledge
(stackoverflow.blog)
in programming@programming.dev from Pro@programming.dev on 07 Aug 18:38
comments (15)
in programming@programming.dev from Pro@programming.dev on 07 Aug 18:38
comments (15)
What Git clients do you use?
in programming@programming.dev from Faalangst_26@feddit.nl on 07 Aug 16:41
comments (92)
in programming@programming.dev from Faalangst_26@feddit.nl on 07 Aug 16:41
comments (92)
GenAI Used to Impersonate Brazil’s Govt Websites | ThreatLabz
(www.zscaler.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:24
comments (0)
Shared secret: EDR killer in the kill chain – Sophos News
(news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:17
comments (0)
Makop Ransomware Identified in Attacks in South Korea - ASEC
(asec.ahnlab.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:10
comments (0)
Google suffers data breach in ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 14:01
comments (0)
KLM Confirms Customer Data Breach Linked to Third-Party System
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:57
comments (1)
Ukraine claims to have hacked secrets from Russia's newest nuclear submarine
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 13:50
comments (0)
Announcing Rust 1.89.0
(blog.rust-lang.org)
in rust@programming.dev from nemeski@mander.xyz on 07 Aug 13:24
comments (12)
in rust@programming.dev from nemeski@mander.xyz on 07 Aug 13:24
comments (12)
Rust Making Progress On Its 2025 Project Goals
(www.phoronix.com)
in rust@programming.dev from cm0002@piefed.world on 07 Aug 03:18
comments (1)
in rust@programming.dev from cm0002@piefed.world on 07 Aug 03:18
comments (1)
Visualise your Go program runtime metrics in real time in the browser with Statsviz (Golang)
(github.com)
in golang@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
GCC Front-End For Rust - July 2025 Monthly report
(rust-gcc.github.io)
in rust@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 06 Aug 21:39
comments (0)
New Method Is the Fastest Way To Find the Best Routes
(www.quantamagazine.org)
in programming@programming.dev from misk@piefed.social on 06 Aug 20:26
comments (11)
in programming@programming.dev from misk@piefed.social on 06 Aug 20:26
comments (11)
Gov+
(www.bbb.org)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 18:34
comments (4)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 18:34
comments (4)
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 16:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 16:23
comments (0)
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 14:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 14:49
comments (0)
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto | SentinelOne
(www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:08
comments (0)
Rapid Breach: Social Engineering to Remote Access in 300 Seconds | NCC Group
(www.nccgroup.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 13:00
comments (0)
Cybersecurity Services, Solutions & Products. Global Provider | Group-IB
(www.group-ib.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:56
comments (0)
Pandora confirms data breach amid ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:49
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:49
comments (1)
PBS confirms data breach after employee info leaked on Discord servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:40
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:40
comments (2)
Cisco User Data Stolen in Vishing Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:33
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 12:33
comments (4)
Zellij 0.43 just released - bringing the terminal to your browser
(www.reddit.com)
in programming@programming.dev from lens0021@lemmy.ml on 06 Aug 04:45
comments (3)
in programming@programming.dev from lens0021@lemmy.ml on 06 Aug 04:45
comments (3)
lib.rs has a special surprise when you search "twitter"
(lib.rs)
in rust@programming.dev from qaz@lemmy.world on 05 Aug 2025 20:02
comments (14)
in rust@programming.dev from qaz@lemmy.world on 05 Aug 2025 20:02
comments (14)