Status update, September 2025
bisco.orgยท1d
๐Ÿฆ€Rust Macros
Show HN: A playful DNS server with useful utilities and services
dnsplay.funยท1dยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Hackers claiming ties to Clop launch wide extortion campaign targeting corporate executives
cybersecuritydive.comยท1h
๐Ÿ”“Hacking
DataGrip Is Now Free for Non-Commercial Use
blog.jetbrains.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
New UI for Emacs' org-social.el
activity.andros.devยท7hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
FlowSynx โ€“ Orchestrate Declarative, Plugin-Driven DAG Workflows on .NET
flowsynx.ioยท1dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Beyond Adoption: What It Takes to Scale Kubernetes
devtron.aiยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Orchestration
Self-hosting NextJS at Scale in 2025
sherpa.shยท17hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Learning Python Programming โ€ข Fabrizio Romano & Naomi Ceder โ€ข GOTO 2025
youtube.comยท5h
๐Ÿ”—Concatenative Programming
openSUSE Leap 16 out with the new Agama installer, safeguards against Y2K38 disaster & more
neowin.netยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Streamlined application deployment for schools with Jamf School
jamf.comยท4h
๐Ÿ“ฆPackage Managers
Enabling Claude Code to work more autonomously
anthropic.comยท3dยท
๐ŸŒณIncremental Parsing
FAQ: The Shai-hulud npm worm attack explained
reversinglabs.comยท2d
๐Ÿ’ฟWORM Storage
Apple urges users to update iPhone and Mac to patch font bug
securityaffairs.comยท1d
๐Ÿ” Terminal Fonts
Red Hat confirms security incident after hackers claim GitHub breach
bleepingcomputer.comยท7hยท
๐Ÿ”“Hacking
Analyzing Latent Concepts in Code Language Models
arxiv.orgยท13h
๐Ÿ”ขDenotational Semantics
WAForth โ€“ Forth interpreter and compiler for WebAssembly
github.comยท1dยท
Discuss: Hacker News
๐ŸŒWASI
This new phishing kit turns PDF files into malware - here's how to stay safe
techradar.comยท1d
๐Ÿ”“Password Cracking
Orchestrating Policy-Driven Tests with Kyverno, Argo Events, and Testkube -- Sonali Srivastava
youtube.comยท16h
๐Ÿ‘๏ธObservatory Systems
Guaranteed Safe AI: Blending Neural Nets with Symbolic Proofs for Trustworthy Agents
dev.toยท13hยท
Discuss: DEV
๐Ÿ”งHardware Verification