programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
The Technology the Trump Administration Could Use to Hack Your Phone
(www.newyorker.com)
in cybersecurity@sh.itjust.works from jaromil@fed.dyne.org on 23 Nov 06:50
comments (3)
in cybersecurity@sh.itjust.works from jaromil@fed.dyne.org on 23 Nov 06:50
comments (3)
China Wiretaps Americans in 'Worst Hack in Our Nation's History'
(gizmodo.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Nov 02:28
comments (0)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 23 Nov 02:28
comments (0)
All Our Aggregates Are Wrong - Mauro Servienti
(www.youtube.com)
in programming@programming.dev from BlueSerendipity8@programming.dev on 22 Nov 23:20
comments (0)
in programming@programming.dev from BlueSerendipity8@programming.dev on 22 Nov 23:20
comments (0)
Five Ransomware Groups Responsible for 40% of Cyber-Attacks in 2024
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:32
comments (0)
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 14:30
comments (0)
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
(www.wired.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 22 Nov 13:48
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 22 Nov 13:48
comments (6)
'Water Barghest' Sells Hijacked IoT Devices for Proxy Botnet Misuse
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (1)
US military officials used China-linked promotional gift shop GS-JJ, exposing over 300K emails
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Nov 11:41
comments (4)
Can I have single boot Windows 10 on an Intel Macbook?
in programming@programming.dev from notTheCat@lemmy.ml on 22 Nov 11:11
comments (8)
in programming@programming.dev from notTheCat@lemmy.ml on 22 Nov 11:11
comments (8)
Apple Admits to Security Vulnerability That Leaves Crypto Users Exposed—Here's What You Should Do - Decrypt
(decrypt.co)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 22 Nov 09:37
comments (1)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 22 Nov 09:37
comments (1)
Looking for Mentor (for a PhD Candidate) that works with open source and Rust
in rust@lemmy.ml from thevoidzero@lemmy.world on 21 Nov 05:27
comments (0)
in rust@lemmy.ml from thevoidzero@lemmy.world on 21 Nov 05:27
comments (0)
Re-thinking the Visitor Pattern with the Double-Dispatch Approach
(exceptionnotfound.net)
in programming@programming.dev from BlueSerendipity8@programming.dev on 21 Nov 22:35
comments (1)
in programming@programming.dev from BlueSerendipity8@programming.dev on 21 Nov 22:35
comments (1)
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:09
comments (0)
2,000 Palo Alto Networks devices compromised in latest attacks
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:07
comments (0)
Helldown Ransomware Attacking VMware ESX And Linux Servers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 18:06
comments (0)
Practices of Reliable Software Design
(entropicthoughts.com)
in programming@programming.dev from learnbyexample@programming.dev on 21 Nov 13:48
comments (1)
in programming@programming.dev from learnbyexample@programming.dev on 21 Nov 13:48
comments (1)
MITRE shares 2024's top 25 most dangerous software weaknesses
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:57
comments (0)
China's Liminal Panda APT Attacks Telcos, Steals Data
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:55
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:55
comments (2)
Ransomware Gangs Evolve: They're Now Recruiting Penetration Testers
(blog.knowbe4.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:52
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:52
comments (2)
Ubuntu affected by 10-year-old flaws in needrestart package
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
Cyberattack at French hospital exposes health data of 750,000 patients
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:46
comments (0)
US and UK Military Social Network "Forces Penpals" Exposes SSN, PII Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Nov 11:45
comments (0)
Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
(thehackernews.com)
in programming@programming.dev from unknowing8343@discuss.tchncs.de on 21 Nov 11:45
comments (2)
in programming@programming.dev from unknowing8343@discuss.tchncs.de on 21 Nov 11:45
comments (2)
D-Link says replace vulnerable routers or risk pwnage
(www.theregister.com)
in cybersecurity@sh.itjust.works from cron@feddit.org on 21 Nov 08:28
comments (2)
in cybersecurity@sh.itjust.works from cron@feddit.org on 21 Nov 08:28
comments (2)
Humble Tech Book Bundle: Math for Programmers 2024 by Manning
(www.humblebundle.com)
in programming@programming.dev from SmartmanApps@programming.dev on 21 Nov 05:11
comments (20)
in programming@programming.dev from SmartmanApps@programming.dev on 21 Nov 05:11
comments (20)
BianLian group based in Russia, is moving from ransomware attacks to extortion.
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 21 Nov 01:34
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 21 Nov 01:34
comments (0)
Simple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systems
(arxiv.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 23:27
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 23:27
comments (0)
You’re not as loosely coupled as you think!
(codeopinion.com)
in programming@programming.dev from BlueSerendipity8@programming.dev on 20 Nov 19:56
comments (6)
in programming@programming.dev from BlueSerendipity8@programming.dev on 20 Nov 19:56
comments (6)
5 Defendants Charged Federally with Running Scheme that Targeted Victim Companies via Phishing Text Messages
(www.justice.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 19:51
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 19:51
comments (0)
A Shiny New Programming Language - Hackster.io
(www.hackster.io)
in programming@programming.dev from 0x0@programming.dev on 20 Nov 17:37
comments (15)
in programming@programming.dev from 0x0@programming.dev on 20 Nov 17:37
comments (15)
“Sad announcement” email leads to tech support scam
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:02
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:02
comments (0)
Adversaries Abuse Microsoft Teams and Quick Assist
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:00
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 17:00
comments (0)
How Did REST Come To Mean The Opposite of REST? | htmx
(htmx.org)
in programming@programming.dev from Kissaki@programming.dev on 20 Nov 12:29
comments (16)
in programming@programming.dev from Kissaki@programming.dev on 20 Nov 12:29
comments (16)
Ghost Tap: New cash-out tactic with NFC Relay
(www.threatfabric.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 12:02
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 12:02
comments (0)
Malicious QR codes
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:42
comments (4)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:42
comments (4)
Threat assessment: Ignoble Scorpius, distributors of BlackSuit ransomware
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:40
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 11:40
comments (0)
On "Safe" C++
(izzys.casa)
in programming@programming.dev from LearnedDonkey@kbin.earth on 20 Nov 09:13
comments (29)
in programming@programming.dev from LearnedDonkey@kbin.earth on 20 Nov 09:13
comments (29)
FLTK 1.4 Released With Wayland & HiDPI Display Support on Phoronix (19 Nov 2024)
(www.phoronix.com)
in programming@programming.dev from thingsiplay@beehaw.org on 20 Nov 05:42
comments (0)
in programming@programming.dev from thingsiplay@beehaw.org on 20 Nov 05:42
comments (0)
Fintech Giant Finastra Investigating Data Breach
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:43
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:43
comments (1)
Fighting cybercrime is no hack job
(360info.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:33
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:33
comments (0)
Cybercrime-as-a-service: the industry behind online attacks
(360info.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:28
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 01:28
comments (0)
Apple Fixes Two Exploited Vulnerabilities
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 00:11
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 20 Nov 00:11
comments (0)
TSA Is Taking Steps to Enhance Cybersecurity, but Additional Actions Are Needed
(www.gao.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 23:14
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 23:14
comments (0)
[newbie] Can I specify what subset of errors a function can return?
in rust@lemmy.ml from gomp@lemmy.ml on 19 Nov 16:29
comments (0)
in rust@lemmy.ml from gomp@lemmy.ml on 19 Nov 16:29
comments (0)
Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence
(cloud.google.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:31
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:31
comments (0)
Free AI editor lures in victims, installs information stealer instead on Windows and Mac
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:29
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:29
comments (0)
Gen Q3/2024 Threat Report
(www.gendigital.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:14
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 18:14
comments (0)
Library of Congress' Email System Compromised for Nine Months by Unknown Hackers
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:29
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:29
comments (0)
A Study of Malware Prevention in Linux Distributions
(arxiv.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:10
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 13:10
comments (1)
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (2)
Ford 'actively investigating' breach claims
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:48
comments (0)
Recently disclosed VMware vCenter Server bugs are actively exploited in attacks
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:47
comments (0)
Apache Kafka Vulnerability Let Attackers Escalate Privileges
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 12:44
comments (0)
Ransomware Attack on Oklahoma Medical Center Impacts 133,000
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
Space tech giant Maxar confirms hacker accessed employees' personal data
(techcrunch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:55
comments (0)
Akira Ransomware Racks Up 30+ Victims in a Single Day
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Nov 11:46
comments (1)
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:44
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:44
comments (0)
Helldown Ransomware: an overview of this emerging threat
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:08
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 11:08
comments (0)
Kaspersky online shopping threat report 2024
(securelist.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 10:13
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 19 Nov 10:13
comments (0)
The Thirty Million Line Problem
(www.youtube.com)
in programming@programming.dev from agilob@programming.dev on 19 Nov 07:22
comments (7)
in programming@programming.dev from agilob@programming.dev on 19 Nov 07:22
comments (7)
What do you code in Rust?
in rust@lemmy.ml from ClusterBomb@lemmy.blahaj.zone on 18 Nov 11:01
comments (0)
in rust@lemmy.ml from ClusterBomb@lemmy.blahaj.zone on 18 Nov 11:01
comments (0)
AI company tells SEC that $250,000 stolen in cyberattack
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 22:18
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 22:18
comments (0)
Babble Babble Babble Babble Babble Babble BabbleLoader
(intezer.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:34
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:34
comments (1)
Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime Charges
(www.justice.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:21
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:21
comments (0)
Simultaneously resettable zero knowledge protocol in Public Key model
(cybersecurity.springeropen.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:17
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:17
comments (1)
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
(www.proofpoint.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:11
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 20:11
comments (1)
Let's Encrypt is 10 years old today !
(letsencrypt.org)
in cybersecurity@sh.itjust.works from pcouy@lemmy.pierre-couy.fr on 18 Nov 19:15
comments (4)
in cybersecurity@sh.itjust.works from pcouy@lemmy.pierre-couy.fr on 18 Nov 19:15
comments (4)
Fortra Reports Alarming Increase In Abuse Of Cloudflare Services
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:30
comments (0)
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 18:22
comments (0)
QuickBooks popup scam still being delivered via Google ads
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:54
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:54
comments (0)
Inside Bitdefender Labs’ Investigation of a Malicious Facebook Ad Campaign Targeting Bitwarden Users
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:26
comments (3)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 17:26
comments (3)
British software company Microlise confirms hackers compromised corporate data
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 16:19
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 16:19
comments (0)
Security Update - Release 1.32.5 · dani-garcia/vaultwarden
(github.com)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 18 Nov 13:25
comments (1)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 18 Nov 13:25
comments (1)
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:46
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:46
comments (4)
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:42
comments (0)
Zero-Day Exploitation Targeting Palo Alto Networks Firewall
(www.rapid7.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:40
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Nov 11:40
comments (1)
I made a FOSS AI file organizer!
(github.com)
in programming@programming.dev from justzvan@lemmy.ml on 18 Nov 11:35
comments (19)
in programming@programming.dev from justzvan@lemmy.ml on 18 Nov 11:35
comments (19)
Baby unit tests
(johan.hal.se)
in programming@programming.dev from rglullis@communick.news on 18 Nov 09:32
comments (16)
in programming@programming.dev from rglullis@communick.news on 18 Nov 09:32
comments (16)
Exploit attempts for unpatched Citrix vulnerability
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 07:26
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 18 Nov 07:26
comments (0)
Phishing emails increasingly use SVG attachments to evade detection
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (2)
Security plugin flaw in millions of WordPress sites gives admin access
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 17 Nov 22:29
comments (1)
CSS Gets a New Logo: And It Uses the Color `rebeccapurple`
(michaelcharl.es)
in programming@programming.dev from popcar2@programming.dev on 17 Nov 13:37
comments (12)
in programming@programming.dev from popcar2@programming.dev on 17 Nov 13:37
comments (12)
Ancient TP-Link Backdoor Discovered by Attackers
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 17 Nov 09:22
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 17 Nov 09:22
comments (1)
RIP Thomas Kurtz
(hackaday.com)
in programming@programming.dev from sjpwarren@programming.dev on 16 Nov 23:53
comments (4)
in programming@programming.dev from sjpwarren@programming.dev on 16 Nov 23:53
comments (4)
How to define / edit a struct istance field with a method?
in rust@lemmy.ml from dontblink@feddit.it on 15 Nov 11:35
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 15 Nov 11:35
comments (0)
Simple Include Statement Hides Casino Spam
(blog.sucuri.net)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 12:59
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 12:59
comments (0)
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
(blog.eclecticiq.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 08:12
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 08:12
comments (0)
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 08:10
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 15 Nov 08:10
comments (0)
Speeding up the Rust edit-build-run cycle
(davidlattimore.github.io)
in rust@lemmy.ml from copacetic@discuss.tchncs.de on 14 Nov 20:49
comments (0)
dupe: rust@programming.dev (12)
in rust@lemmy.ml from copacetic@discuss.tchncs.de on 14 Nov 20:49
comments (0)
dupe: rust@programming.dev (12)
Recommend me a Python book for absolute beginners
in programming@programming.dev from pathief@lemmy.world on 14 Nov 19:41
comments (21)
in programming@programming.dev from pathief@lemmy.world on 14 Nov 19:41
comments (21)
ChatGPT allows access to underlying sandbox OS, “playbook” data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 18:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 18:28
comments (0)
Malware being delivered by mail, warns Swiss cyber agency
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 18:27
comments (2)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 18:27
comments (2)
Hungary confirms hack of defense procurement agency
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 18:16
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 18:16
comments (0)
MVCTipCalc: Simple MVC example fyne project that doubles as a tip calculator.
(github.com)
in programming@programming.dev from DichotoDeezNutz@lemmy.world on 14 Nov 16:10
comments (0)
dupe: golang@programming.dev (0)
in programming@programming.dev from DichotoDeezNutz@lemmy.world on 14 Nov 16:10
comments (0)
dupe: golang@programming.dev (0)
Strela Stealer: Today's invoice is tomorrow's phish
(securityintelligence.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 15:15
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 15:15
comments (0)
CVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wild
(www.clearskysec.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 15:11
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 15:11
comments (0)
Advertisers are pushing ad and pop-up blockers using old tricks
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 15:04
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 15:04
comments (0)
Evaluating Synthetic Command Attacks on Smart Voice Assistants
(arxiv.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 13:47
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 13:47
comments (1)
Chipmaker Patch Tuesday: Intel Publishes 44 and AMD Publishes 8 New Advisories
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:49
comments (0)
Hive0145 Targets Europe with Advanced Strela Stealer Campaigns
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:49
comments (0)
Embargo ransomware claims breach of US pharmacy network
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:48
comments (0)
New PXA Stealer targets government and education sectors for sensitive information
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 11:37
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 11:37
comments (0)
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:37
comments (0)
Leaked info of 122 million linked to B2B data aggregator breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Nov 11:34
comments (0)
New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9
(blog.xlab.qianxin.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 11:33
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 11:33
comments (0)
Crimeware and financial predictions for 2025
(securelist.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 09:39
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 09:39
comments (0)
Announcing .NET 9 - .NET Blog
(devblogs.microsoft.com)
in programming@programming.dev from Kissaki@programming.dev on 14 Nov 08:33
comments (2)
in programming@programming.dev from Kissaki@programming.dev on 14 Nov 08:33
comments (2)
Joint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructure
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 23:51
comments (7)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 23:51
comments (7)
NIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikely
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 23:39
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 23:39
comments (0)
SecEncoder: Logs are All You Need in Security
(arxiv.org)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 21:02
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 21:02
comments (0)
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 20:11
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 20:11
comments (0)
Zoom addressed two high-severity issues in its platform
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 17:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 17:17
comments (0)
New ShrinkLocker ransomware decryptor recovers BitLocker password
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 17:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 17:16
comments (0)
Git Commit Creation
(drewdeponte.com)
in programming@programming.dev from drewdeponte@programming.dev on 13 Nov 13:17
comments (10)
in programming@programming.dev from drewdeponte@programming.dev on 13 Nov 13:17
comments (10)
Inside the DemandScience by Pure Incubation Data Breach
(www.troyhunt.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 12:07
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 12:07
comments (0)
HawkEye Malware: Technical Analysis
(any.run)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 11:44
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 11:44
comments (0)
Global Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Them
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 11:43
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 11:43
comments (0)
Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 11:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 11:28
comments (0)
Emmenhtal Loader Uses Scripts to Deliver Lumma and Other Malware
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 11:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 11:26
comments (0)
North Korean hackers create Flutter apps to bypass macOS security
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 11:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Nov 11:24
comments (0)
Internet-exposed GNSS receivers pose threat globally in 2024
(securelist.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 11:01
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 11:01
comments (0)
Rust Foundation Releases Problem Statement on C++/Rust Interoperability
(foundation.rust-lang.org)
in rust@programming.dev from snaggen@programming.dev on 13 Nov 08:19
comments (7)
in rust@programming.dev from snaggen@programming.dev on 13 Nov 08:19
comments (7)
China-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payload
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 05:40
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 05:40
comments (0)
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
(securityscorecard.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 05:18
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 05:18
comments (0)
Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)
(labs.watchtowr.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 05:15
comments (2)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 13 Nov 05:15
comments (2)
Security Test of Skills
in cybersecurity@sh.itjust.works from Vintage@sh.itjust.works on 13 Nov 02:40
comments (0)
in cybersecurity@sh.itjust.works from Vintage@sh.itjust.works on 13 Nov 02:40
comments (0)
Go Turns 15
(go.dev)
in golang@programming.dev from thomask@lemmy.sdf.org on 13 Nov 02:27
comments (0)
in golang@programming.dev from thomask@lemmy.sdf.org on 13 Nov 02:27
comments (0)
Abusing Ubuntu 24.04 features for root privilege escalation
(snyk.io)
in cybersecurity@sh.itjust.works from thomask@lemmy.sdf.org on 13 Nov 02:17
comments (1)
in cybersecurity@sh.itjust.works from thomask@lemmy.sdf.org on 13 Nov 02:17
comments (1)
Rust needs an official specification
(tweedegolf.nl)
in rust@programming.dev from snaggen@programming.dev on 12 Nov 21:02
comments (21)
in rust@programming.dev from snaggen@programming.dev on 12 Nov 21:02
comments (21)
US Senate To Revive Software Patents With PERA Bill Vote On Thursday
(news.intellectia.ai)
in programming@programming.dev from mox@lemmy.sdf.org on 12 Nov 20:51
comments (10)
in programming@programming.dev from mox@lemmy.sdf.org on 12 Nov 20:51
comments (10)
Citrix Zero-Day Bug Allows Unauthenticated RCE
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 19:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 19:26
comments (0)
Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 91 flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 19:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 19:25
comments (0)
Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 18:02
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 18:02
comments (1)
Surge in exploits of zero-day vulnerabilities is ‘new normal’ warns Five Eyes alliance
(therecord.media)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 17:15
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 17:15
comments (0)
To kill memory safety bugs in C code, try the TrapC fork
(go.theregister.com)
in programming@programming.dev from godiganbabay@ponder.cat on 12 Nov 16:38
comments (3)
in programming@programming.dev from godiganbabay@ponder.cat on 12 Nov 16:38
comments (3)
New GitLoker-Linked GoIssue Tool Targets GitHub Users for Phishing
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 14:18
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 14:18
comments (1)
New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 14:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 14:10
comments (0)
Palo Alto Networks warns over possible PAN-OS RCE: Says get your blooming interface off the internet
(www.thestack.technology)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 Nov 12:47
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 Nov 12:47
comments (0)
Microsoft Bookings Flaw Enables Account Hijacking and Impersonation
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 12:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 12:28
comments (0)
HIBP notifies 57 million people of Hot Topic data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 12:26
comments (0)
Microsoft Visio Files Used in Sophisticated Phishing Attacks
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 12:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Nov 12:24
comments (0)
Exploiting KsecDD through Server Silos
(blog.scrt.ch)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 11:57
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 11:57
comments (0)
ModeLeak: Privilege Escalation to LLM Model Exfiltration in Vertex AI
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 11:30
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 11:30
comments (0)
Dissecting A Multi-Stage PowerShell Campaign Using Chisel
(cyble.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 08:45
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 12 Nov 08:45
comments (0)
Traversals
(blog.ploeh.dk)
in programming@programming.dev from CodiUnicorn@programming.dev on 12 Nov 08:44
comments (0)
in programming@programming.dev from CodiUnicorn@programming.dev on 12 Nov 08:44
comments (0)
Embedded and sandboxed scripting languages in Rust
in rust@programming.dev from AsudoxDev@programming.dev on 12 Nov 08:21
comments (22)
in rust@programming.dev from AsudoxDev@programming.dev on 12 Nov 08:21
comments (22)
Halliburton reports $35 million loss after ransomware attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 16:49
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 16:49
comments (8)
Tor Network Thwarts IP Spoofing Attack
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 16:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 16:44
comments (0)
Release 1.32.4 · dani-garcia/vaultwarden
(github.com)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 11 Nov 15:25
comments (1)
in cybersecurity@sh.itjust.works from Branquinho@lemmy.eco.br on 11 Nov 15:25
comments (1)
Massive MOVEit Vulnerability Breach: Hacker Leaks Employee Data from Amazon, McDonald's, HSBC, HP, and Potentially 1000+ Other Companies
(www.infostealers.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 11 Nov 15:08
comments (4)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 11 Nov 15:08
comments (4)
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT
(github.com)
in cybersecurity@sh.itjust.works from jaromil@fed.dyne.org on 11 Nov 12:20
comments (0)
in cybersecurity@sh.itjust.works from jaromil@fed.dyne.org on 11 Nov 12:20
comments (0)
Police Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Out
(www.404media.co)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 12:17
comments (19)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 12:17
comments (19)
Hackers Use Excel Files to Deliver Remcos RAT Variant on Windows
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Nov 11:54
comments (0)
Kaspersky discovers new Ymir ransomware used together with RustyStealer
(securelist.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 11 Nov 10:40
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 11 Nov 10:40
comments (1)
The US government wants devs to stop using C and C++
(www.theregister.com)
in programming@programming.dev from lemmee_in@lemm.ee on 10 Nov 13:43
comments (91)
in programming@programming.dev from lemmee_in@lemm.ee on 10 Nov 13:43
comments (91)
sqlx::Transaction and Arc<Mutex<Transaction>>
in rust@programming.dev from Cpo@lemm.ee on 10 Nov 10:26
comments (18)
in rust@programming.dev from Cpo@lemm.ee on 10 Nov 10:26
comments (18)
How do I use Option and the '?' operator with a for loop?
in rust@lemmy.ml from dontblink@feddit.it on 08 Nov 12:01
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 08 Nov 12:01
comments (0)
gccrs: An alternative compiler for Rust
(blog.rust-lang.org)
in rust@lemmy.ml from JRepin@lemmy.ml on 08 Nov 02:09
comments (0)
in rust@lemmy.ml from JRepin@lemmy.ml on 08 Nov 02:09
comments (0)
CXX-Qt 0.7 release
(www.kdab.com)
in rust@lemmy.ml from JRepin@lemmy.ml on 31 Oct 14:31
comments (0)
in rust@lemmy.ml from JRepin@lemmy.ml on 31 Oct 14:31
comments (0)
I present: Managarr - A TUI and CLI to help you manage your Servarr instances
(github.com)
in rust@lemmy.ml from aclarke@lemmy.world on 31 Oct 04:19
comments (0)
in rust@lemmy.ml from aclarke@lemmy.world on 31 Oct 04:19
comments (0)
Would this be a correct syntax for error handling when making an http request?
in rust@lemmy.ml from dontblink@feddit.it on 25 Oct 10:22
comments (0)
in rust@lemmy.ml from dontblink@feddit.it on 25 Oct 10:22
comments (0)
Bash Script to compile a single rust script, execute the binary and delete the binary
in rust@lemmy.ml from trymeout@lemmy.world on 22 Oct 2024 22:54
comments (0)
in rust@lemmy.ml from trymeout@lemmy.world on 22 Oct 2024 22:54
comments (0)
Ibis version 0.1.2
in rust@lemmy.ml from nutomic@lemmy.ml on 15 Oct 2024 18:28
comments (0)
in rust@lemmy.ml from nutomic@lemmy.ml on 15 Oct 2024 18:28
comments (0)
[newbie] one-liner to avoid "temporary value dropped while borrowed"?
in rust@lemmy.ml from gomp@lemmy.ml on 26 Sep 2024 07:41
comments (0)
in rust@lemmy.ml from gomp@lemmy.ml on 26 Sep 2024 07:41
comments (0)
Understanding Rust Ownership: Immutable and Mutable References, RC and RefCell
(github.com)
in rust@lemmy.ml from tracyspcy@lemmy.ml on 25 Sep 2024 16:53
comments (0)
in rust@lemmy.ml from tracyspcy@lemmy.ml on 25 Sep 2024 16:53
comments (0)
Want to contribute to Lemmy? Heres a list of good issues to get started
(github.com)
in rust@lemmy.ml from nutomic@lemmy.ml on 25 Sep 2024 08:20
comments (0)
in rust@lemmy.ml from nutomic@lemmy.ml on 25 Sep 2024 08:20
comments (0)
FBI: Spike in Hacked Police Emails, Fake Subpoenas
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 10 Nov 07:53
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 10 Nov 07:53
comments (1)
Lemmy post blocking (by key word) extension for Firefox
in programming@programming.dev from Bluetreefrog@lemmy.world on 10 Nov 06:42
comments (7)
in programming@programming.dev from Bluetreefrog@lemmy.world on 10 Nov 06:42
comments (7)
A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities
(jhftss.github.io)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 09 Nov 21:04
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 09 Nov 21:04
comments (0)
Hello again, FakeBat: popular loader returns after months-long hiatus
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 09 Nov 21:03
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 09 Nov 21:03
comments (0)
Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 09 Nov 18:07
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 09 Nov 18:07
comments (0)
Why Full Text Search is Hard
(transactional.blog)
in programming@programming.dev from learnbyexample@programming.dev on 09 Nov 11:37
comments (3)
in programming@programming.dev from learnbyexample@programming.dev on 09 Nov 11:37
comments (3)
Androxgh0st botnet integrates Mozi payloads to target IoT devices
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Nov 01:43
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Nov 01:43
comments (0)
D-Link won’t fix critical flaw affecting 60,000 older NAS devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Nov 01:42
comments (5)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Nov 01:42
comments (5)
Unpatched Mazda Connect bugs let hackers install persistent malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Nov 01:41
comments (4)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 09 Nov 01:41
comments (4)
Getting a Nitrokey 3A work with usbguard
(support.nitrokey.com)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 09 Nov 00:38
comments (2)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 09 Nov 00:38
comments (2)
GodFather Malware Now Targets 500+ Banking and Crypto Apps
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 14:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 14:30
comments (0)
CISA warns of critical Palo Alto Networks bug exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 13:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 13:51
comments (0)
Texas-based oilfield supplier faces disruptions following ransomware attack
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:40
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:40
comments (2)
Interlock Ransomware Targets US Healthcare, IT and Government Sectors
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:40
comments (0)
Evasive ZIP Concatenation: Trojan Targets Windows Users
(perception-point.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:14
comments (0)
Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:14
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:14
comments (4)
VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:13
comments (0)
Cisco Identity Services Engine Flaw Bypass Authorization Mechanisms
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:13
comments (0)
North Korean hackers use new macOS malware against crypto firms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Nov 12:10
comments (0)
An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form
(www.mdpi.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 08 Nov 11:57
comments (1)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 08 Nov 11:57
comments (1)
How Good at Math Does a Programmer Need to Be?
in programming@programming.dev from anonymouse2@sh.itjust.works on 08 Nov 11:52
comments (76)
in programming@programming.dev from anonymouse2@sh.itjust.works on 08 Nov 11:52
comments (76)
Threat Campaign Spreads Winos4.0 Through Game Application
(www.fortinet.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 08 Nov 10:54
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 08 Nov 10:54
comments (0)
QSC: new modular framework in CloudComputating campaigns
(securelist.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 08 Nov 10:53
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 08 Nov 10:53
comments (0)
Debian in WSL not Ubuntu
(talepunk.com)
in programming@programming.dev from adam431@lemmy.world on 08 Nov 06:53
comments (23)
in programming@programming.dev from adam431@lemmy.world on 08 Nov 06:53
comments (23)
Google Summer of Code 2024 results
(blog.rust-lang.org)
in rust@programming.dev from snaggen@programming.dev on 07 Nov 18:56
comments (1)
in rust@programming.dev from snaggen@programming.dev on 07 Nov 18:56
comments (1)
Hackers increasingly use Winos4.0 post-exploitation kit in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Nov 18:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Nov 18:47
comments (0)
German Law Could Protect Researchers Reporting Vulns
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 07 Nov 18:02
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 07 Nov 18:02
comments (0)
An encrypted and anti-forensic public web chat server
in cybersecurity@sh.itjust.works from Super_gamer46861@lemmy.world on 07 Nov 16:45
comments (0)
in cybersecurity@sh.itjust.works from Super_gamer46861@lemmy.world on 07 Nov 16:45
comments (0)
CISSP Practice Question
(docs.google.com)
in cybersecurity@sh.itjust.works from johnboscow@sh.itjust.works on 07 Nov 13:11
comments (2)
in cybersecurity@sh.itjust.works from johnboscow@sh.itjust.works on 07 Nov 13:11
comments (2)
Sign ups for the Games for Blind Gamers 4 Game Jam is open! Help make this the best accessibility game jam ever!
in programming@programming.dev from ericbomb@lemmy.world on 06 Nov 22:20
comments (3)
in programming@programming.dev from ericbomb@lemmy.world on 06 Nov 22:20
comments (3)
Is Python's tooling incredibly difficult, or am I just stupid?
in programming@programming.dev from zaphodb2002@sh.itjust.works on 06 Nov 18:44
comments (115)
in programming@programming.dev from zaphodb2002@sh.itjust.works on 06 Nov 18:44
comments (115)
javascript encrypted persistance
in programming@programming.dev from xoron@programming.dev on 06 Nov 17:14
comments (0)
in programming@programming.dev from xoron@programming.dev on 06 Nov 17:14
comments (0)