New comment by iamartech in "Ask HN: Who wants to be hired? (November 2025)"
๐ปProgramming
Flag this post
Beyond CASB: SaaS Security in the Era of Shadow IT and AI Integrations
guidepointsecurity.comยท1d
๐Monitoring
Flag this post
Identified Behind the Mask
๐ปProgramming
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.comยท1d
๐CI/CD
Flag this post
Cybercriminals Target Fans Ahead of 2026 FIFA World Cup, Norton Warns
blogger.comยท12h
๐Monitoring
Flag this post
Anyone else thinks turning on BitLocker Encryption on by default on Windows 11 without notifying users is a bad decision?
๐งLinux
Flag this post
How to point at fascists and laugh
buttondown.comยท4h
๐ฆRust
Flag this post
Proactive RDS Monitoring: How We Built an EventBridge-Powered Alert System for Flawless BFCM Events
๐Monitoring
Flag this post
From Repetitive Code to Clean Architecture: How the Decorator Pattern Simplified Activity Logging by 70%
๐Software Architecture
Flag this post
Deep Dive in Transparent Proxy Code
๐ปProgramming
Flag this post
Creating a dummy login for HP laptop
๐งLinux
Flag this post
Louvre Jewel Heist Reveals Decades of Cybersecurity Failures
windowsforum.comยท1d
๐Infrastructure
Flag this post
libffi/libffi
github.comยท3h
๐ปProgramming
Flag this post
The Secret Life of Python: The String Intern Pool - When Two Strings Are One Object
๐ปProgramming
Flag this post
Enterprise Credentials at Risk โ Same Old, Same Old?
thehackernews.comยท18h
๐Monitoring
Flag this post
Loading...Loading more...