New comment by jabedude in "Ask HN: Who wants to be hired? (November 2025)"
🦹cybercrime
Flag this post
Resolving the Scourge of Java's Checked Exceptions on Its Streams and Lambdas
🦹cybercrime
Flag this post
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
blogger.com·18h
🦹cybercrime
Flag this post
Introducing FadCrypt v2.0: Finally, a Beautiful Desktop App Locker & File Encryptor That Actually Works
🦹cybercrime
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·2d
🦹cybercrime
Flag this post
Crowdstrike: AI Accelerating Ransomware Attacks Across Europe
techrepublic.com·2d
🔍Cyber threat intelligence
Flag this post
Ernst & Young Exposes 4TB Database Backup Online, Leaking Company Secrets
blogger.com·14h
🦹cybercrime
Flag this post
Deploy Your Web App in 1 Minute
🦹cybercrime
Flag this post
Protection against surveillance
discuss.privacyguides.net·4h
🦹cybercrime
Flag this post
Watch out, these malicious Android apps have been downloaded 42 million times - and could leave you seriously out of pocket
techradar.com·2d
🦹cybercrime
Flag this post
US Congressional Budget Office Hit By Suspected Foreign Cyberattack
it.slashdot.org·2d
🦹cybercrime
Flag this post
NPM supply chain attacks with Charlie Erickson
opensourcesecurity.io·1h
🦹cybercrime
Flag this post
Ransomware Surge Poses Geopolitical and Economic Risks, Warns Joint Cybersecurity Report
blogger.com·12h
🦹cybercrime
Flag this post
Account Takeover via IDOR: From UserID to Full Access
infosecwriteups.com·16h
🔍Cyber threat intelligence
Flag this post
Hackers Exploit AI Stack in Windows to Deploy Malware
blogger.com·10h
🦹cybercrime
Flag this post
How to rate-limit requests with NGINX
joshtronic.com·1d
🦹cybercrime
Flag this post
Loading...Loading more...