[{"title":"WARNING: Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations","description":"If the Pulse Connect Secure gateway is part of your organization network, you need to be aware of a newly discovered critical zero-day authentication bypass vulnerability (CVE-2021-22893) that is currently being exploited in the wild and for which there is no patch yet.\nAt least two threat actors have been behind a series of intrusions targeting defense, government, and financial organizations<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ikaH7G4KoXI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ikaH7G4KoXI/warning-hackers-exploit-unpatched-pulse.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ikaH7G4KoXI/warning-hackers-exploit-unpatched-pulse.html","updated_at":"2021-04-21T05:33:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ikaH7G4KoXI/warning-hackers-exploit-unpatched-pulse.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances","description":"SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in the wild.\nTracked as CVE-2021-20021 and CVE-2021-20022, the flaws were discovered and reported to the company by FireEye's Mandiant subsidiary on March 26, 2021, after the cybersecurity firm detected post-exploitation web shell activity on<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ZJZxGWLjL1k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZJZxGWLjL1k/3-zero-day-exploits-hit-sonicwall.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZJZxGWLjL1k/3-zero-day-exploits-hit-sonicwall.html","updated_at":"2021-04-21T05:17:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZJZxGWLjL1k/3-zero-day-exploits-hit-sonicwall.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Node.js 16 introduces Apple Silicon support","link":"https://www.reddit.com/r/programming/comments/mv8rqp/nodejs_16_introduces_apple_silicon_support/","comments":"https://www.reddit.com/r/programming/comments/mv8rqp/nodejs_16_introduces_apple_silicon_support/","updated_at":"2021-04-21T05:10:03+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mv8rqp/nodejs_16_introduces_apple_silicon_support/","link_host":"reddit.com","from":"reddit"},{"title":"OCaml has some new shiny syntax","link":"https://www.reddit.com/r/programming/comments/mv6rom/ocaml_has_some_new_shiny_syntax/","comments":"https://www.reddit.com/r/programming/comments/mv6rom/ocaml_has_some_new_shiny_syntax/","updated_at":"2021-04-21T02:54:07+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mv6rom/ocaml_has_some_new_shiny_syntax/","link_host":"reddit.com","from":"reddit"},{"title":"Embedded Dev 2021","link":"https://www.reddit.com/r/programming/comments/mv6ftk/embedded_dev_2021/","comments":"https://www.reddit.com/r/programming/comments/mv6ftk/embedded_dev_2021/","updated_at":"2021-04-21T02:33:04+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mv6ftk/embedded_dev_2021/","link_host":"reddit.com","from":"reddit"},{"title":"Fill OTP forms within cross-origin iframes with WebOTP API","link":"https://www.reddit.com/r/programming/comments/mv6eg6/fill_otp_forms_within_crossorigin_iframes_with/","comments":"https://www.reddit.com/r/programming/comments/mv6eg6/fill_otp_forms_within_crossorigin_iframes_with/","updated_at":"2021-04-21T02:30:38+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mv6eg6/fill_otp_forms_within_crossorigin_iframes_with/","link_host":"reddit.com","from":"reddit"},{"title":"The Greshm System [pdf]","description":"<a href="https://news.ycombinator.com/item?id=26884532">Comments</a>","link":"https://www.greshm.org/files/greshm.pdf","comments":"https://news.ycombinator.com/item?id=26884532","updated_at":"2021-04-21T01:56:09+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26884532","link_host":"www.greshm.org","from":"hackernews"},{"title":"Quantum Astronomy Could Create Telescopes Hundreds of Kilometers Wide","description":"<a href="https://news.ycombinator.com/item?id=26884502">Comments</a>","link":"https://www.scientificamerican.com/article/quantum-astronomy-could-create-telescopes-hundreds-of-kilometers-wide/","comments":"https://news.ycombinator.com/item?id=26884502","updated_at":"2021-04-21T01:51:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26884502","link_host":"www.scientificamerican.com","from":"hackernews"},{"title":"Researcher says he can link Facebook accounts to 5M email addresses per day","description":"<a href="https://news.ycombinator.com/item?id=26884452">Comments</a>","link":"https://arstechnica.com/gadgets/2021/04/tool-links-email-addresses-to-facebook-accounts-at-scale/","comments":"https://news.ycombinator.com/item?id=26884452","updated_at":"2021-04-21T01:44:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26884452","link_host":"arstechnica.com","from":"hackernews"},{"title":"Git from the Bottom Up","description":"<a href="https://news.ycombinator.com/item?id=26884318">Comments</a>","link":"https://jwiegley.github.io/git-from-the-bottom-up/","comments":"https://news.ycombinator.com/item?id=26884318","updated_at":"2021-04-21T01:23:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26884318","link_host":"jwiegley.github.io","from":"hackernews"},{"title":"Tetris-OS: An operating system that only plays Tetris","description":"<a href="https://news.ycombinator.com/item?id=26883645">Comments</a>","link":"https://github.com/jdah/tetris-os","comments":"https://news.ycombinator.com/item?id=26883645","updated_at":"2021-04-21T00:02:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26883645","link_host":"github.com","from":"hackernews"},{"title":".NET for Beginners (2020)","description":"<a href="https://news.ycombinator.com/item?id=26882606">Comments</a>","link":"https://dusted.codes/dotnet-for-beginners","comments":"https://news.ycombinator.com/item?id=26882606","updated_at":"2021-04-20T22:18:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26882606","link_host":"dusted.codes","from":"hackernews"},{"title":".NET MAUI: .NET Multi-Platform App UI","description":"<a href="https://news.ycombinator.com/item?id=26882185">Comments</a>","link":"https://github.com/dotnet/maui","comments":"https://news.ycombinator.com/item?id=26882185","updated_at":"2021-04-20T21:43:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26882185","link_host":"github.com","from":"hackernews"},{"title":"Lisp in Forth","description":"<a href="https://news.ycombinator.com/item?id=26882117">Comments</a>","link":"https://github.com/schani/forthlisp","comments":"https://news.ycombinator.com/item?id=26882117","updated_at":"2021-04-20T21:39:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26882117","link_host":"github.com","from":"hackernews"},{"title":"Show HN: Mongita is to MongoDB as SQLite is to SQL","description":"<a href="https://news.ycombinator.com/item?id=26881915">Comments</a>","link":"https://github.com/scottrogowski/mongita","comments":"https://news.ycombinator.com/item?id=26881915","updated_at":"2021-04-20T21:23:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26881915","link_host":"github.com","from":"hackernews"},{"title":"The Landlord's Game","description":"<a href="https://news.ycombinator.com/item?id=26881799">Comments</a>","link":"https://en.wikipedia.org/wiki/The_Landlord%27s_Game","comments":"https://news.ycombinator.com/item?id=26881799","updated_at":"2021-04-20T21:15:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26881799","link_host":"en.wikipedia.org","from":"hackernews"},{"title":"2021 Jakarta EE Developer Survey by open source org the Eclipse Foundation","link":"https://www.reddit.com/r/programming/comments/mv0gh7/2021_jakarta_ee_developer_survey_by_open_source/","comments":"https://www.reddit.com/r/programming/comments/mv0gh7/2021_jakarta_ee_developer_survey_by_open_source/","updated_at":"2021-04-20T21:08:22+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mv0gh7/2021_jakarta_ee_developer_survey_by_open_source/","link_host":"reddit.com","from":"reddit"},{"title":"AtoB (YC S20) – Stripe for Transportation – hiring early engineers and operators","description":"<a href="https://news.ycombinator.com/item?id=26881603">Comments</a>","link":"https://atob.co/careers","comments":"https://news.ycombinator.com/item?id=26881603","updated_at":"2021-04-20T21:00:18+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26881603","link_host":"atob.co","from":"hackernews"},{"title":"Designing Hierarchical State Machines Using Frame Notation","link":"https://www.reddit.com/r/programming/comments/muzgg3/designing_hierarchical_state_machines_using_frame/","comments":"https://www.reddit.com/r/programming/comments/muzgg3/designing_hierarchical_state_machines_using_frame/","updated_at":"2021-04-20T20:22:18+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muzgg3/designing_hierarchical_state_machines_using_frame/","link_host":"reddit.com","from":"reddit"},{"title":"Pulumi 3.0","description":"<a href="https://news.ycombinator.com/item?id=26880935">Comments</a>","link":"https://www.pulumi.com/blog/pulumi-3-0/","comments":"https://news.ycombinator.com/item?id=26880935","updated_at":"2021-04-20T20:14:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26880935","link_host":"www.pulumi.com","from":"hackernews"},{"title":"YouTube CEO Susan Wojcicki Gets 'Freedom Expression' Award Sponsored by YouTube","description":"<a href="https://news.ycombinator.com/item?id=26880582">Comments</a>","link":"https://www.newsweek.com/youtube-ceo-susan-wojcicki-gets-freedom-expression-award-sponsored-youtube-1585147","comments":"https://news.ycombinator.com/item?id=26880582","updated_at":"2021-04-20T19:55:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26880582","link_host":"www.newsweek.com","from":"hackernews"},{"title":"Sponsor: BugHerd changes vague feedback into visual, trackable tasks. Pin feedback and capture technical information to act on.","description":"https://synd.co/2PXh2mr","link":"https://www.designernews.co/stories/114901-sponsor-bugherd-changes-vague-feedback-into-visual-trackable-tasks-pin-feedback-and-capture-technical-information-to-act-on","comments":"https://www.designernews.co/stories/114901-sponsor-bugherd-changes-vague-feedback-into-visual-trackable-tasks-pin-feedback-and-capture-technical-information-to-act-on","updated_at":"2021-04-20T18:31:48+00:00","link_to_comments":"https://www.designernews.co/stories/114901-sponsor-bugherd-changes-vague-feedback-into-visual-trackable-tasks-pin-feedback-and-capture-technical-information-to-act-on","link_host":"synd.co","from":"designernews"},{"title":"Don't POOP - The Partial/Optional Object Population Anti-Pattern","link":"https://www.reddit.com/r/programming/comments/muwyvm/dont_poop_the_partialoptional_object_population/","comments":"https://www.reddit.com/r/programming/comments/muwyvm/dont_poop_the_partialoptional_object_population/","updated_at":"2021-04-20T18:29:19+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muwyvm/dont_poop_the_partialoptional_object_population/","link_host":"reddit.com","from":"reddit"},{"title":"Is it Pokémon or Big Data?","link":"https://www.reddit.com/r/programming/comments/muwc85/is_it_pokémon_or_big_data/","comments":"https://www.reddit.com/r/programming/comments/muwc85/is_it_pokémon_or_big_data/","updated_at":"2021-04-20T18:01:29+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muwc85/is_it_pokémon_or_big_data/","link_host":"reddit.com","from":"reddit"},{"title":"Prolog for Beginners","link":"https://www.reddit.com/r/programming/comments/muwa8g/prolog_for_beginners/","comments":"https://www.reddit.com/r/programming/comments/muwa8g/prolog_for_beginners/","updated_at":"2021-04-20T17:59:13+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muwa8g/prolog_for_beginners/","link_host":"reddit.com","from":"reddit"},{"title":"Auth0 has been down for 2+ hours with the root cause still unidentified","link":"https://www.reddit.com/r/programming/comments/muw9ju/auth0_has_been_down_for_2_hours_with_the_root/","comments":"https://www.reddit.com/r/programming/comments/muw9ju/auth0_has_been_down_for_2_hours_with_the_root/","updated_at":"2021-04-20T17:58:23+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muw9ju/auth0_has_been_down_for_2_hours_with_the_root/","link_host":"reddit.com","from":"reddit"},{"title":"Show HN: I'm working on a open-source, self-hosted alternative to Disqus","description":"<a href="https://news.ycombinator.com/item?id=26878153">Comments</a>","link":"https://cusdis.com","comments":"https://news.ycombinator.com/item?id=26878153","updated_at":"2021-04-20T17:56:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26878153","link_host":"cusdis.com","from":"hackernews"},{"title":"Crunchy Bridge - Fully managed Postgres on GCP","link":"https://www.reddit.com/r/programming/comments/muw1nu/crunchy_bridge_fully_managed_postgres_on_gcp/","comments":"https://www.reddit.com/r/programming/comments/muw1nu/crunchy_bridge_fully_managed_postgres_on_gcp/","updated_at":"2021-04-20T17:48:34+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muw1nu/crunchy_bridge_fully_managed_postgres_on_gcp/","link_host":"reddit.com","from":"reddit"},{"title":"Grafana, Loki, and Tempo will be relicensed to AGPLv3","link":"https://www.reddit.com/r/programming/comments/muvkek/grafana_loki_and_tempo_will_be_relicensed_to/","comments":"https://www.reddit.com/r/programming/comments/muvkek/grafana_loki_and_tempo_will_be_relicensed_to/","updated_at":"2021-04-20T17:27:29+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muvkek/grafana_loki_and_tempo_will_be_relicensed_to/","link_host":"reddit.com","from":"reddit"},{"title":"Grafana, Loki, and Tempo will be relicensed to AGPLv3","description":"<a href="https://news.ycombinator.com/item?id=26877528">Comments</a>","link":"https://grafana.com/blog/2021/04/20/grafana-loki-tempo-relicensing-to-agplv3/","comments":"https://news.ycombinator.com/item?id=26877528","updated_at":"2021-04-20T17:17:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26877528","link_host":"grafana.com","from":"hackernews"},{"title":"Discord ends deal talks with Microsoft","description":"<a href="https://news.ycombinator.com/item?id=26877526">Comments</a>","link":"https://www.wsj.com/articles/discord-ends-deal-talks-with-microsoft-11618938806","comments":"https://news.ycombinator.com/item?id=26877526","updated_at":"2021-04-20T17:17:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26877526","link_host":"www.wsj.com","from":"hackernews"},{"title":"Apple Introduces AirTag","description":"<a href="https://news.ycombinator.com/item?id=26877484">Comments</a>","link":"https://www.apple.com/newsroom/2021/04/apple-introduces-airtag/","comments":"https://news.ycombinator.com/item?id=26877484","updated_at":"2021-04-20T17:14:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26877484","link_host":"www.apple.com","from":"hackernews"},{"title":"Margin Notes: Automatic documentation with recorded examples from runtime (2018)","description":"<a href="https://news.ycombinator.com/item?id=26877443">Comments</a>","link":"https://www.geoffreylitt.com/margin-notes/","comments":"https://news.ycombinator.com/item?id=26877443","updated_at":"2021-04-20T17:10:18+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26877443","link_host":"www.geoffreylitt.com","from":"hackernews"},{"title":"Numerically stable algorithm for computing the running mean","link":"https://www.reddit.com/r/programming/comments/muuphh/numerically_stable_algorithm_for_computing_the/","comments":"https://www.reddit.com/r/programming/comments/muuphh/numerically_stable_algorithm_for_computing_the/","updated_at":"2021-04-20T16:49:28+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muuphh/numerically_stable_algorithm_for_computing_the/","link_host":"reddit.com","from":"reddit"},{"title":"Over 750,000 Users Downloaded New Billing Fraud Apps From Google Play Store","description":"Researchers have uncovered a new set of fraudulent Android apps in the Google Play store that were found to hijack SMS message notifications for carrying out billing fraud.\nThe apps in question primarily targeted users in Southwest Asia and the Arabian Peninsula, attracting a total of 700,000 downloads before they were discovered and removed from the platform.\nThe findings were reported<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/kqinvgKL80E" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/kqinvgKL80E/over-750000-users-download-new-billing.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kqinvgKL80E/over-750000-users-download-new-billing.html","updated_at":"2021-04-20T16:19:08+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kqinvgKL80E/over-750000-users-download-new-billing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"CVE-2021-30481: Source engine remote code execution via game invites","link":"https://www.reddit.com/r/programming/comments/mutwax/cve202130481_source_engine_remote_code_execution/","comments":"https://www.reddit.com/r/programming/comments/mutwax/cve202130481_source_engine_remote_code_execution/","updated_at":"2021-04-20T16:13:22+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mutwax/cve202130481_source_engine_remote_code_execution/","link_host":"reddit.com","from":"reddit"},{"title":"Node.js v16 released","link":"https://www.reddit.com/r/programming/comments/mutp9s/nodejs_v16_released/","comments":"https://www.reddit.com/r/programming/comments/mutp9s/nodejs_v16_released/","updated_at":"2021-04-20T16:04:40+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mutp9s/nodejs_v16_released/","link_host":"reddit.com","from":"reddit"},{"title":"mRNA vaccines – a new era in vaccinology (2018)","description":"<a href="https://news.ycombinator.com/item?id=26876195">Comments</a>","link":"https://www.nature.com/articles/nrd.2017.243","comments":"https://news.ycombinator.com/item?id=26876195","updated_at":"2021-04-20T15:46:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26876195","link_host":"www.nature.com","from":"hackernews"},{"title":"Create a Dashboard Page with Figma Design System","description":"https://youtube.com/watch?v=lXSrtc3fxQQ","link":"https://www.designernews.co/stories/114898-create-a-dashboard-page-with-figma-design-system","comments":"https://www.designernews.co/stories/114898-create-a-dashboard-page-with-figma-design-system","updated_at":"2021-04-20T15:35:12+00:00","link_to_comments":"https://www.designernews.co/stories/114898-create-a-dashboard-page-with-figma-design-system","link_host":"youtube.com","from":"designernews"},{"title":"How To Sell An App Idea","description":"https://jelvix.com/blog/how-to-verify-your-app-idea","link":"https://www.designernews.co/stories/114897-how-to-sell-an-app-idea","comments":"https://www.designernews.co/stories/114897-how-to-sell-an-app-idea","updated_at":"2021-04-20T15:21:08+00:00","link_to_comments":"https://www.designernews.co/stories/114897-how-to-sell-an-app-idea","link_host":"jelvix.com","from":"designernews"},{"title":"10K visitors in one day: how I launched a Netflix recommendation app","link":"https://www.reddit.com/r/programming/comments/musd36/10k_visitors_in_one_day_how_i_launched_a_netflix/","comments":"https://www.reddit.com/r/programming/comments/musd36/10k_visitors_in_one_day_how_i_launched_a_netflix/","updated_at":"2021-04-20T15:04:48+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/musd36/10k_visitors_in_one_day_how_i_launched_a_netflix/","link_host":"reddit.com","from":"reddit"},{"title":"Preparing Rustls for Wider Adoption","description":"<a href="https://news.ycombinator.com/item?id=26875551">Comments</a>","link":"https://www.abetterinternet.org/post/preparing-rustls-for-wider-adoption/","comments":"https://news.ycombinator.com/item?id=26875551","updated_at":"2021-04-20T14:56:00+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26875551","link_host":"www.abetterinternet.org","from":"hackernews"},{"title":"Include-what-you-use: A tool to analyze includes in C and C++ source files","description":"<a href="https://news.ycombinator.com/item?id=26875353">Comments</a>","link":"https://include-what-you-use.org/","comments":"https://news.ycombinator.com/item?id=26875353","updated_at":"2021-04-20T14:43:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26875353","link_host":"includewhatyouuse.org","from":"hackernews"},{"title":"You can use CSS generators to avoid some time-consuming tasks. I made a collection of the best CSS generators for you.","link":"https://www.reddit.com/r/programming/comments/murt16/you_can_use_css_generators_to_avoid_some/","comments":"https://www.reddit.com/r/programming/comments/murt16/you_can_use_css_generators_to_avoid_some/","updated_at":"2021-04-20T14:39:38+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/murt16/you_can_use_css_generators_to_avoid_some/","link_host":"reddit.com","from":"reddit"},{"title":"Localizing dates in a Perl web application","link":"https://www.reddit.com/r/programming/comments/mur426/localizing_dates_in_a_perl_web_application/","comments":"https://www.reddit.com/r/programming/comments/mur426/localizing_dates_in_a_perl_web_application/","updated_at":"2021-04-20T14:07:20+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mur426/localizing_dates_in_a_perl_web_application/","link_host":"reddit.com","from":"reddit"},{"title":"Charm delivers Stripe's carbon removal purchase ahead of schedule","description":"<a href="https://news.ycombinator.com/item?id=26874619">Comments</a>","link":"https://charmindustrial.com/blog/2021/4/19/charm-announces-ahead-of-schedule-delivery-of-stripes-carbon-removal-purchase","comments":"https://news.ycombinator.com/item?id=26874619","updated_at":"2021-04-20T13:49:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26874619","link_host":"charmindustrial.com","from":"hackernews"},{"title":"Listing the contents of a remote ZIP archive, without downloading the entire file","link":"https://www.reddit.com/r/programming/comments/mupxw5/listing_the_contents_of_a_remote_zip_archive/","comments":"https://www.reddit.com/r/programming/comments/mupxw5/listing_the_contents_of_a_remote_zip_archive/","updated_at":"2021-04-20T13:09:47+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mupxw5/listing_the_contents_of_a_remote_zip_archive/","link_host":"reddit.com","from":"reddit"},{"title":"IBM employee forced to stop kernel work for using personal email address","link":"https://www.reddit.com/r/programming/comments/muoj21/ibm_employee_forced_to_stop_kernel_work_for_using/","comments":"https://www.reddit.com/r/programming/comments/muoj21/ibm_employee_forced_to_stop_kernel_work_for_using/","updated_at":"2021-04-20T11:47:13+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muoj21/ibm_employee_forced_to_stop_kernel_work_for_using/","link_host":"reddit.com","from":"reddit"},{"title":"Car Connectivity Consortium","description":"<a href="https://news.ycombinator.com/item?id=26873203">Comments</a>","link":"https://carconnectivity.org/","comments":"https://news.ycombinator.com/item?id=26873203","updated_at":"2021-04-20T11:28:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26873203","link_host":"carconnectivity.org","from":"hackernews"},{"title":"[eBook] Why Autonomous XDR Is Going to Replace NGAV/EDR","description":"For most organizations today, endpoint protection is the primary security concern. This is not unreasonable – endpoints tend to be the weakest points in an environment – but it also misses the forest for the trees. As threat surfaces expand, security professionals are harder pressed to detect threats that target other parts of an environment and can easily miss a real vulnerability by focusing<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xLeFTAxIXJ0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xLeFTAxIXJ0/ebook-why-autonomous-xdr-is-going-to.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xLeFTAxIXJ0/ebook-why-autonomous-xdr-is-going-to.html","updated_at":"2021-04-20T11:06:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xLeFTAxIXJ0/ebook-why-autonomous-xdr-is-going-to.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Porting Doom to the Fastly edge serverless platform","description":"<a href="https://news.ycombinator.com/item?id=26872944">Comments</a>","link":"https://www.fastly.com/blog/compute-edge-porting-the-iconic-video-game-doom","comments":"https://news.ycombinator.com/item?id=26872944","updated_at":"2021-04-20T10:50:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26872944","link_host":"www.fastly.com","from":"hackernews"},{"title":"120 Compromised Ad Servers Target Millions of Internet Users","description":"An ongoing malvertising campaign tracked as "Tag Barnakle" has been behind the breach of more than 120 ad servers over the past year to sneakily inject code in an attempt to serve malicious advertisements that redirect users to rogue websites, thus exposing victims to scamware or malware.\nUnlike other operators who set about their task by infiltrating the ad-tech ecosystem using "convincing<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/hOzKgHpYjXk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/hOzKgHpYjXk/120-compromised-ad-servers-target.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hOzKgHpYjXk/120-compromised-ad-servers-target.html","updated_at":"2021-04-20T10:41:36+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hOzKgHpYjXk/120-compromised-ad-servers-target.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Take My Money: UX Practices on Product Page Design","description":"https://blog.tubikstudio.com/product-page-design/","link":"https://www.designernews.co/stories/114891-take-my-money-ux-practices-on-product-page-design","comments":"https://www.designernews.co/stories/114891-take-my-money-ux-practices-on-product-page-design","updated_at":"2021-04-20T10:31:22+00:00","link_to_comments":"https://www.designernews.co/stories/114891-take-my-money-ux-practices-on-product-page-design","link_host":"blog.tubikstudio.com","from":"designernews"},{"title":"Show HN: Manuzoid – Database of More Than 1M Manuals","description":"<a href="https://news.ycombinator.com/item?id=26872808">Comments</a>","link":"https://manuzoid.com/","comments":"https://news.ycombinator.com/item?id=26872808","updated_at":"2021-04-20T10:22:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26872808","link_host":"manuzoid.com","from":"hackernews"},{"title":"Useful Sketch plugins and where to find them","description":"https://blog.plantapp.io/post/useful-sketch-plugins-and-where-to-find-them","link":"https://www.designernews.co/stories/114889-useful-sketch-plugins-and-where-to-find-them","comments":"https://www.designernews.co/stories/114889-useful-sketch-plugins-and-where-to-find-them","updated_at":"2021-04-20T09:25:31+00:00","link_to_comments":"https://www.designernews.co/stories/114889-useful-sketch-plugins-and-where-to-find-them","link_host":"blog.plantapp.io","from":"designernews"},{"title":"Continued Fractions in Haskell","description":"<a href="https://news.ycombinator.com/item?id=26872463">Comments</a>","link":"https://cdsmithus.medium.com/continued-fractions-haskell-equational-reasoning-property-testing-and-rewrite-rules-in-action-77a16d750e3f","comments":"https://news.ycombinator.com/item?id=26872463","updated_at":"2021-04-20T09:24:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26872463","link_host":"cdsmithus.medium.com","from":"hackernews"},{"title":"Prototype Pollution","description":"<a href="https://news.ycombinator.com/item?id=26872281">Comments</a>","link":"https://portswigger.net/daily-swig/prototype-pollution-the-dangerous-and-underrated-vulnerability-impacting-javascript-applications","comments":"https://news.ycombinator.com/item?id=26872281","updated_at":"2021-04-20T08:54:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26872281","link_host":"portswigger.net","from":"hackernews"},{"title":"Open source goes to Mars 🚀 - The GitHub Blog","link":"https://www.reddit.com/r/programming/comments/muktit/open_source_goes_to_mars_the_github_blog/","comments":"https://www.reddit.com/r/programming/comments/muktit/open_source_goes_to_mars_the_github_blog/","updated_at":"2021-04-20T07:04:41+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/muktit/open_source_goes_to_mars_the_github_blog/","link_host":"reddit.com","from":"reddit"},{"title":"WinGet is terrible. I want AppGet back.","link":"https://www.reddit.com/r/programming/comments/mujtxg/winget_is_terrible_i_want_appget_back/","comments":"https://www.reddit.com/r/programming/comments/mujtxg/winget_is_terrible_i_want_appget_back/","updated_at":"2021-04-20T05:52:19+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mujtxg/winget_is_terrible_i_want_appget_back/","link_host":"reddit.com","from":"reddit"},{"title":"Show HN: Ruby code and tools for animating Voronoi diagrams","description":"<a href="https://news.ycombinator.com/item?id=26871080">Comments</a>","link":"https://github.com/mike-bourgeous/mb-geometry","comments":"https://news.ycombinator.com/item?id=26871080","updated_at":"2021-04-20T05:40:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26871080","link_host":"github.com","from":"hackernews"},{"title":"Lazarus APT Hackers are now using BMP images to hide RAT malware","description":"A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information.\nAttributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/wHc4_FCN43Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/wHc4_FCN43Y/lazarus-apt-hackers-are-now-using-bmp.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wHc4_FCN43Y/lazarus-apt-hackers-are-now-using-bmp.html","updated_at":"2021-04-20T05:33:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wHc4_FCN43Y/lazarus-apt-hackers-are-now-using-bmp.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"10 Most Important Robotic Process Automation (RPA) Tools in Demand","description":"https://www.zenesys.com/blog/10-most-important-robotic-process-automation-rpa-tools-in-demand","link":"https://www.designernews.co/stories/114885-10-most-important-robotic-process-automation-rpa-tools-in-demand","comments":"https://www.designernews.co/stories/114885-10-most-important-robotic-process-automation-rpa-tools-in-demand","updated_at":"2021-04-20T05:25:36+00:00","link_to_comments":"https://www.designernews.co/stories/114885-10-most-important-robotic-process-automation-rpa-tools-in-demand","link_host":"www.zenesys.com","from":"designernews"},{"title":"Complete guide on how to create an app like Bet365","description":"https://www.webcluesinfotech.com/cost-to-develop-sports-betting-app-like-bet365/","link":"https://www.designernews.co/stories/114884-complete-guide-on-how-to-create-an-app-like-bet365","comments":"https://www.designernews.co/stories/114884-complete-guide-on-how-to-create-an-app-like-bet365","updated_at":"2021-04-20T04:55:09+00:00","link_to_comments":"https://www.designernews.co/stories/114884-complete-guide-on-how-to-create-an-app-like-bet365","link_host":"www.webcluesinfotech.com","from":"designernews"},{"title":"Graphics Codex is now a free online computer graphics rendering and ray tracing textbook","link":"https://www.reddit.com/r/programming/comments/mugin9/graphics_codex_is_now_a_free_online_computer/","comments":"https://www.reddit.com/r/programming/comments/mugin9/graphics_codex_is_now_a_free_online_computer/","updated_at":"2021-04-20T02:20:04+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mugin9/graphics_codex_is_now_a_free_online_computer/","link_host":"reddit.com","from":"reddit"},{"title":"Detect When Specific Terms or Phrases Are Added to Any Site","description":"https://needlex3.com/","link":"https://www.designernews.co/stories/114879-detect-when-specific-terms-or-phrases-are-added-to-any-site","comments":"https://www.designernews.co/stories/114879-detect-when-specific-terms-or-phrases-are-added-to-any-site","updated_at":"2021-04-19T22:02:05+00:00","link_to_comments":"https://www.designernews.co/stories/114879-detect-when-specific-terms-or-phrases-are-added-to-any-site","link_host":"needlex3.com","from":"designernews"},{"title":"Has a remote Amazonian tribe upended our understanding of language? (2007)","description":"<a href="https://news.ycombinator.com/item?id=26868259">Comments</a>","link":"https://www.newyorker.com/magazine/2007/04/16/the-interpreter-2","comments":"https://news.ycombinator.com/item?id=26868259","updated_at":"2021-04-19T21:42:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26868259","link_host":"www.newyorker.com","from":"hackernews"},{"title":"How Restaurant Website Design Can Help You Sell More Food In 2021","description":"https://marketsplash.com/restaurant-website-design/","link":"https://www.designernews.co/stories/114876-how-restaurant-website-design-can-help-you-sell-more-food-in-2021","comments":"https://www.designernews.co/stories/114876-how-restaurant-website-design-can-help-you-sell-more-food-in-2021","updated_at":"2021-04-19T17:24:46+00:00","link_to_comments":"https://www.designernews.co/stories/114876-how-restaurant-website-design-can-help-you-sell-more-food-in-2021","link_host":"marketsplash.com","from":"designernews"},{"title":"How often do people actually copy and paste from Stack Overflow? Now we know.","link":"https://www.reddit.com/r/programming/comments/mu5c08/how_often_do_people_actually_copy_and_paste_from/","comments":"https://www.reddit.com/r/programming/comments/mu5c08/how_often_do_people_actually_copy_and_paste_from/","updated_at":"2021-04-19T17:10:02+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mu5c08/how_often_do_people_actually_copy_and_paste_from/","link_host":"reddit.com","from":"reddit"},{"title":"Visual Studio 2022","link":"https://www.reddit.com/r/programming/comments/mu33ox/visual_studio_2022/","comments":"https://www.reddit.com/r/programming/comments/mu33ox/visual_studio_2022/","updated_at":"2021-04-19T15:28:45+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/mu33ox/visual_studio_2022/","link_host":"reddit.com","from":"reddit"},{"title":"Technologies Could Hold Back Business Travel Indefinitely","description":"<a href="https://news.ycombinator.com/item?id=26863712">Comments</a>","link":"https://www.wsj.com/articles/these-technologies-could-hold-back-business-travel-indefinitely-11618632059","comments":"https://news.ycombinator.com/item?id=26863712","updated_at":"2021-04-19T15:20:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=26863712","link_host":"www.wsj.com","from":"hackernews"},{"title":"Vectornator 4.0 - An Illustrator’s Perspective","description":"https://www.vectornator.io/blog/jaye-kang","link":"https://www.designernews.co/stories/114874-vectornator-40--an-illustrators-perspective","comments":"https://www.designernews.co/stories/114874-vectornator-40--an-illustrators-perspective","updated_at":"2021-04-19T15:17:19+00:00","link_to_comments":"https://www.designernews.co/stories/114874-vectornator-40--an-illustrators-perspective","link_host":"www.vectornator.io","from":"designernews"},{"title":"Generative art and vectorization from raster images or photo","description":"https://apps.apple.com/by/app/formone/id1547888470","link":"https://www.designernews.co/stories/114873-generative-art-and-vectorization-from-raster-images-or-photo","comments":"https://www.designernews.co/stories/114873-generative-art-and-vectorization-from-raster-images-or-photo","updated_at":"2021-04-19T15:00:56+00:00","link_to_comments":"https://www.designernews.co/stories/114873-generative-art-and-vectorization-from-raster-images-or-photo","link_host":"apps.apple.com","from":"designernews"},{"title":"Product Design and UI/UX Education: What are my options?","description":"https://designerup.co/blog/product-design-and-ui-ux-education-what-are-my-options/","link":"https://www.designernews.co/stories/114869-product-design-and-uiux-education-what-are-my-options","comments":"https://www.designernews.co/stories/114869-product-design-and-uiux-education-what-are-my-options","updated_at":"2021-04-19T11:59:49+00:00","link_to_comments":"https://www.designernews.co/stories/114869-product-design-and-uiux-education-what-are-my-options","link_host":"designerup.co","from":"designernews"},{"title":"Malware That Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs","description":"A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps.\nXCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon the building, were configured to execute the payload. The malware repackages payload<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/HQSDSF0JqhY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/HQSDSF0JqhY/malware-spreads-via-xcode-projects-now.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HQSDSF0JqhY/malware-spreads-via-xcode-projects-now.html","updated_at":"2021-04-19T11:58:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HQSDSF0JqhY/malware-spreads-via-xcode-projects-now.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Passwordless: More Mirage Than Reality","description":"The concept of "passwordless" authentication has been gaining significant industry and media attention. And for a good reason. Our digital lives are demanding an ever-increasing number of online accounts and services, with security best practices dictating that each requires a strong, unique password in order to ensure data stays safe. Who wouldn't want an easier way?\nThat's the premise behind<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PBZrO95kqJ8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PBZrO95kqJ8/passwordless-more-mirage-than-reality.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PBZrO95kqJ8/passwordless-more-mirage-than-reality.html","updated_at":"2021-04-19T11:20:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PBZrO95kqJ8/passwordless-more-mirage-than-reality.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"The Best Templates For Startup Website","description":"https://www.themasterpicks.com/the-best-startup-website/","link":"https://www.designernews.co/stories/114867-the-best-templates-for-startup-website","comments":"https://www.designernews.co/stories/114867-the-best-templates-for-startup-website","updated_at":"2021-04-19T11:05:43+00:00","link_to_comments":"https://www.designernews.co/stories/114867-the-best-templates-for-startup-website","link_host":"www.themasterpicks.com","from":"designernews"},{"title":"Native vs Hybrid vs Web Apps - Which Mobile App Development is better for Businesses?","description":"https://www.zenesys.com/blog/native-vs-hybrid-vs-web-apps","link":"https://www.designernews.co/stories/114862-native-vs-hybrid-vs-web-apps--which-mobile-app-development-is-better-for-businesses","comments":"https://www.designernews.co/stories/114862-native-vs-hybrid-vs-web-apps--which-mobile-app-development-is-better-for-businesses","updated_at":"2021-04-19T07:15:29+00:00","link_to_comments":"https://www.designernews.co/stories/114862-native-vs-hybrid-vs-web-apps--which-mobile-app-development-is-better-for-businesses","link_host":"www.zenesys.com","from":"designernews"},{"title":"Establish a relationship with your user","description":"https://drawer.design/blog/establishing-a-relationship-with-your-user/","link":"https://www.designernews.co/stories/114861-establish-a-relationship-with-your-user","comments":"https://www.designernews.co/stories/114861-establish-a-relationship-with-your-user","updated_at":"2021-04-19T06:34:25+00:00","link_to_comments":"https://www.designernews.co/stories/114861-establish-a-relationship-with-your-user","link_host":"drawer.design","from":"designernews"},{"title":"I’ve spent 5 months building a tool to help you monetise your Airtable bases. Check out the journey so far!","description":"https://jrosendesign.medium.com/10-days-til-launch-paytable-io-my-side-project-turned-labour-of-love-f8fbc49eb4fd","link":"https://www.designernews.co/stories/114851-ive-spent-5-months-building-a-tool-to-help-you-monetise-your-airtable-bases-check-out-the-journey-so-far","comments":"https://www.designernews.co/stories/114851-ive-spent-5-months-building-a-tool-to-help-you-monetise-your-airtable-bases-check-out-the-journey-so-far","updated_at":"2021-04-17T18:42:24+00:00","link_to_comments":"https://www.designernews.co/stories/114851-ive-spent-5-months-building-a-tool-to-help-you-monetise-your-airtable-bases-check-out-the-journey-so-far","link_host":"jrosendesign.medium.com","from":"designernews"},{"title":"SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence","description":"A high-level manager and systems administrator associated with the FIN7 threat actor has been sentenced to 10 years in prison, the U.S. Department of Justice announced Friday.\nFedir Hladyr, a 35-year-old Ukrainian national, is said to have played a crucial role in a criminal scheme that compromised tens of millions of debit and credit cards, in addition to aggregating the stolen information,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/36kinOM_Cpg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/36kinOM_Cpg/sysadmin-of-billion-dollar-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/36kinOM_Cpg/sysadmin-of-billion-dollar-hacking.html","updated_at":"2021-04-17T09:44:52+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/36kinOM_Cpg/sysadmin-of-billion-dollar-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"What are the different roles within cybersecurity?","description":"People talk about the cybersecurity job market like it's a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do.\nIn fact, Cybercrime Magazine came up with a list of 50 cybersecurity job titles, while CyberSN, a recruiting organization, came up with its own list of 45 cybersecurity job categories<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rlVSDhJ2V8I" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/rlVSDhJ2V8I/what-are-different-roles-within.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rlVSDhJ2V8I/what-are-different-roles-within.html","updated_at":"2021-04-17T09:13:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rlVSDhJ2V8I/what-are-different-roles-within.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"When you ask the client for their vector logo","description":"https://twitter.com/uxcabin/status/1383103753553862661","link":"https://www.designernews.co/stories/114843-when-you-ask-the-client-for-their-vector-logo","comments":"https://www.designernews.co/stories/114843-when-you-ask-the-client-for-their-vector-logo","updated_at":"2021-04-16T19:12:31+00:00","link_to_comments":"https://www.designernews.co/stories/114843-when-you-ask-the-client-for-their-vector-logo","link_host":"twitter.com","from":"designernews"},{"title":"800+ Remote UXR Jobs","description":"https://www.userinterviews.com/blog/the-ultimate-remote-ux-research-job-board?&utm_source=designernews","link":"https://www.designernews.co/stories/114842-800-remote-uxr-jobs","comments":"https://www.designernews.co/stories/114842-800-remote-uxr-jobs","updated_at":"2021-04-16T18:17:57+00:00","link_to_comments":"https://www.designernews.co/stories/114842-800-remote-uxr-jobs","link_host":"www.userinterviews.com","from":"designernews"},{"title":"20 Awesome Tailwind Landing Page Templates","description":"https://dev.to/mariann93502220/20-best-tailwind-landing-page-templates-free-premium-3pjn","link":"https://www.designernews.co/stories/114827-20-awesome-tailwind-landing-page-templates","comments":"https://www.designernews.co/stories/114827-20-awesome-tailwind-landing-page-templates","updated_at":"2021-04-16T09:14:02+00:00","link_to_comments":"https://www.designernews.co/stories/114827-20-awesome-tailwind-landing-page-templates","link_host":"dev.to","from":"designernews"},{"title":"Severe Bugs Reported in EtherNet/IP Stack for Industrial Systems","description":"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an advisory warning of multiple vulnerabilities in the OpENer EtherNet/IP stack that could expose industrial systems to denial-of-service (DoS) attacks, data leaks, and remote code execution.\nAll OpENer commits and versions prior to February 10, 2021, are affected, although there are no known public exploits that<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dK0vMTIZer0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dK0vMTIZer0/severe-bugs-reported-in-ethernetip.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dK0vMTIZer0/severe-bugs-reported-in-ethernetip.html","updated_at":"2021-04-16T09:06:17+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dK0vMTIZer0/severe-bugs-reported-in-ethernetip.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"US Sanctions Russia and Expels 10 Diplomats Over SolarWinds Cyberattack","description":"The U.S. and U.K. on Thursday formally attributed the supply chain attack of IT infrastructure management company SolarWinds with "high confidence" to government operatives working for Russia's Foreign Intelligence Service (SVR).\n"Russia's pattern of malign behaviour around the world – whether in cyberspace, in election interference or in the aggressive operations of their intelligence services<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/5swuhQjhJKU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/5swuhQjhJKU/us-sanctions-russia-and-expels-10.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/5swuhQjhJKU/us-sanctions-russia-and-expels-10.html","updated_at":"2021-04-16T06:47:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/5swuhQjhJKU/us-sanctions-russia-and-expels-10.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Who are some of the most valuable freelance / agency people to follow?","description":"I run a membership site for freelancers and agencies that helps find outbound leads (it's called [Folyo](https://folyo.me)). Since I focus on a specific area, I'm looking for other good resources to recommend that touch on other topics.\n\n**Some of my current favorites are:**\n\n- [Double Your Freelancing by Brennan Dunn](https://doubleyourfreelancing.com/)\n\n- [Jonathan Stark](https://jonathanstark.com/)\n\n- [Freelance to Win by Danny Marguiles](https://freelancetowin.com/)\n\n- [I Will Teach You to Be Rich by Ramit Sethi](https://www.iwillteachyoutoberich.com/)\n\n- [The Futur by Chris Do](https://thefutur.com/)\n\n**Also been checking out:**\n\n- [Location Rebel by Sean Ogle](https://www.locationrebel.com/)\n\n- [Freelancing School by Jay Clouse](https://freelancing.school/)\n\nWondering if there's anyone else I should check out?","link":"https://www.designernews.co/stories/114813-who-are-some-of-the-most-valuable-freelance--agency-people-to-follow","comments":"https://www.designernews.co/stories/114813-who-are-some-of-the-most-valuable-freelance--agency-people-to-follow","updated_at":"2021-04-15T17:17:42+00:00","link_to_comments":"https://www.designernews.co/stories/114813-who-are-some-of-the-most-valuable-freelance--agency-people-to-follow","link_host":"woops, can't parse","from":"designernews"},{"title":"1-Click Hack Found in Popular Desktop Apps — Check If You're Using Them","description":"Multiple one-click vulnerabilities have been discovered across a variety of popular software applications, allowing an attacker to potentially execute arbitrary code on target systems.\nThe issues were discovered by Positive Security researchers Fabian Bräunlein and Lukas Euler and affect apps like Telegram, Nextcloud, VLC, LibreOffice, OpenOffice, Bitcoin/Dogecoin Wallets, Wireshark, and Mumble.<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/YY9_4CI-gLI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/YY9_4CI-gLI/1-click-hack-found-in-popular-desktop.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YY9_4CI-gLI/1-click-hack-found-in-popular-desktop.html","updated_at":"2021-04-15T15:42:14+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YY9_4CI-gLI/1-click-hack-found-in-popular-desktop.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"8 Best Inkscape Alternatives (Free & Paid)","description":"https://marketsplash.com/inkscape-alternatives/","link":"https://www.designernews.co/stories/114811-8-best-inkscape-alternatives-free--paid","comments":"https://www.designernews.co/stories/114811-8-best-inkscape-alternatives-free--paid","updated_at":"2021-04-15T14:44:08+00:00","link_to_comments":"https://www.designernews.co/stories/114811-8-best-inkscape-alternatives-free--paid","link_host":"marketsplash.com","from":"designernews"},{"title":"Inside Nintendo's secretive creative process","description":"https://www.theguardian.com/games/2018/apr/25/nintendo-interview-secret-innovation-lab-ideas-working","link":"https://www.designernews.co/stories/114810-inside-nintendos-secretive-creative-process","comments":"https://www.designernews.co/stories/114810-inside-nintendos-secretive-creative-process","updated_at":"2021-04-15T11:59:52+00:00","link_to_comments":"https://www.designernews.co/stories/114810-inside-nintendos-secretive-creative-process","link_host":"www.theguardian.com","from":"designernews"},{"title":"Our first artist, Bessa is Minty #rare digital art NFT. Support her with vote, or even Foundation Bid.","description":"https://tasteminty.com/page/mac/","link":"https://www.designernews.co/stories/114806-our-first-artist-bessa-is-minty-rare-digital-art-nft--support-her-with-vote-or-even-foundation-bid","comments":"https://www.designernews.co/stories/114806-our-first-artist-bessa-is-minty-rare-digital-art-nft--support-her-with-vote-or-even-foundation-bid","updated_at":"2021-04-15T10:57:44+00:00","link_to_comments":"https://www.designernews.co/stories/114806-our-first-artist-bessa-is-minty-rare-digital-art-nft--support-her-with-vote-or-even-foundation-bid","link_host":"tasteminty.com","from":"designernews"},{"title":"Malware Variants: More Sophisticated, Prevalent and Evolving in 2021","description":"A malicious program intended to cause havoc with IT systems—malware—is becoming more and more sophisticated every year. The year 2021 is no exception, as recent trends indicate that several new variants of malware are making their way into the world of cybersecurity.\nWhile smarter security solutions are popping up, modern malware still eludes and challenges cybersecurity experts. \nThe evolution<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/psl9ITlxJwU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/psl9ITlxJwU/malware-variants-more-sophisticated.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/psl9ITlxJwU/malware-variants-more-sophisticated.html","updated_at":"2021-04-15T10:27:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/psl9ITlxJwU/malware-variants-more-sophisticated.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"YIKES! Hackers flood the web with 100,000 pages offering malicious PDFs","description":"Cybercriminals are resorting to search engine poisoning techniques to lure business professionals into seemingly legitimate Google sites that install a Remote Access Trojan (RAT) capable of carrying out a wide range of attacks.\nThe attack works by leveraging searches for business forms such as invoices, templates, questionnaires, and receipts as a stepping stone toward infiltrating the systems.<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/OJUqyXnH4yI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/OJUqyXnH4yI/yikes-cybercriminals-flood-intrenet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OJUqyXnH4yI/yikes-cybercriminals-flood-intrenet.html","updated_at":"2021-04-15T09:38:32+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OJUqyXnH4yI/yikes-cybercriminals-flood-intrenet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"5+ Best Cost Calculator WordPress Plugins","description":"https://wpklik.com/wordpress-plugins/cost-calculator-wordpress-plugins/","link":"https://www.designernews.co/stories/114804-5-best-cost-calculator-wordpress-plugins","comments":"https://www.designernews.co/stories/114804-5-best-cost-calculator-wordpress-plugins","updated_at":"2021-04-15T08:49:00+00:00","link_to_comments":"https://www.designernews.co/stories/114804-5-best-cost-calculator-wordpress-plugins","link_host":"wpklik.com","from":"designernews"},{"title":"New WhatsApp Bugs Could've Let Attackers Hack Your Phone Remotely","description":"Facebook-owned WhatsApp recently addressed two security vulnerabilities in its messaging app for Android that could have been exploited to execute malicious code remotely on the device and even exfiltrate sensitive information.\nThe flaws take aim at devices running Android versions up to and including Android 9 by carrying out what's known as a "man-in-the-disk" attack that makes it possible for<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/qPhYThzKAzI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/qPhYThzKAzI/new-whatsapp-bug-couldve-let-attackers.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/qPhYThzKAzI/new-whatsapp-bug-couldve-let-attackers.html","updated_at":"2021-04-15T06:55:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/qPhYThzKAzI/new-whatsapp-bug-couldve-let-attackers.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"NSA Discovers New Vulnerabilities Affecting Microsoft Exchange Servers","description":"In its April slate of patches, Microsoft rolled out fixes for a total of 114 security flaws, including an actively exploited zero-day and four remote code execution bugs in Exchange Server.\nOf the 114 flaws, 19 are rated as Critical, 88 are rated Important, and one is rated Moderate in severity.\nChief among them is CVE-2021-28310, a privilege escalation vulnerability in Win32k that's said to be<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/s2V5STIU49k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/s2V5STIU49k/nsa-discovers-new-vulnerabilities.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/s2V5STIU49k/nsa-discovers-new-vulnerabilities.html","updated_at":"2021-04-15T05:57:31+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/s2V5STIU49k/nsa-discovers-new-vulnerabilities.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"16 Best Ruby Frameworks For Web Development","description":"https://www.lambdatest.com/blog/16-best-ruby-frameworks/?utm_source=designernews&utm_medium=blog&utm_campaign=PM-15Apr21&utm_term=organicPosting","link":"https://www.designernews.co/stories/114797-16-best-ruby-frameworks-for-web-development","comments":"https://www.designernews.co/stories/114797-16-best-ruby-frameworks-for-web-development","updated_at":"2021-04-15T04:27:48+00:00","link_to_comments":"https://www.designernews.co/stories/114797-16-best-ruby-frameworks-for-web-development","link_host":"www.lambdatest.com","from":"designernews"},{"title":"New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks","description":"Academics from Vrije University in Amsterdam and ETH Zurich have published a new research paper describing yet another variation of the Rowhammer attack.\nDubbed SMASH (Synchronized MAny-Sided Hammering), the technique can be used to successfully trigger the attack from JavaScript on modern DDR4 RAM cards, notwithstanding extensive mitigations that have been put in place by manufacturers over the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/0d5i69wqLJU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/0d5i69wqLJU/new-javascript-exploit-can-now-carry.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/0d5i69wqLJU/new-javascript-exploit-can-now-carry.html","updated_at":"2021-04-14T15:50:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/0d5i69wqLJU/new-javascript-exploit-can-now-carry.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Simplify, then Add Lightness – Consolidating the Technology to Better Defend Ourselves","description":"One of the biggest consequences of the rapidly evolving cybersecurity threat landscape is that defenses must constantly build bigger systems to defend themselves. \nThis leads to both more complex systems and often less communication between them. More importantly, it can lead companies to invest in disparate “best in class” components instead of finding the best fit for their needs.\nThe constant<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/t3hKpk1tsqY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/t3hKpk1tsqY/simplify-then-add-lightness.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t3hKpk1tsqY/simplify-then-add-lightness.html","updated_at":"2021-04-14T12:01:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t3hKpk1tsqY/simplify-then-add-lightness.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Update Your Chrome Browser to Patch 2 New In-the-Wild 0-Day Exploits","description":"Google on Tuesday released a new version of Chrome web-browsing software for Windows, Mac, and Linux with patches for two newly discovered security vulnerabilities for both of which it says exploits exist in the wild, allowing attackers to engage in active exploitation.\nOne of the two flaws concerns an insufficient validation of untrusted input in its V8 JavaScript rendering engine (<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/QXZolEuZKPg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/QXZolEuZKPg/2-new-chrome-0-days-under-attack-update.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/QXZolEuZKPg/2-new-chrome-0-days-under-attack-update.html","updated_at":"2021-04-14T08:32:40+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/QXZolEuZKPg/2-new-chrome-0-days-under-attack-update.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Detecting the \"Next\" SolarWinds-Style Cyber Attack","description":"The SolarWinds attack, which succeeded by utilizing the sunburst malware, shocked the cyber-security industry. This attack achieved persistence and was able to evade internal systems long enough to gain access to the source code of the victim.\nBecause of the far-reaching SolarWinds deployments, the perpetrators were also able to infiltrate many other organizations, looking for intellectual<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/E54HufS4xFI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/E54HufS4xFI/detecting-next-solarwinds-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/E54HufS4xFI/detecting-next-solarwinds-attack.html","updated_at":"2021-04-13T17:21:31+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/E54HufS4xFI/detecting-next-solarwinds-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT Devices","description":"Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices that could be exploited by an attacker to take control of a vulnerable system.\nDubbed "NAME:WRECK" by Forescout and JSOF, the flaws are the latest in series of studies undertaken as part of an initiative called Project Memoria to study the security<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XIF1NSjySrQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XIF1NSjySrQ/new-namewreck-vulnerabilities-impact.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XIF1NSjySrQ/new-namewreck-vulnerabilities-impact.html","updated_at":"2021-04-13T12:24:29+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XIF1NSjySrQ/new-namewreck-vulnerabilities-impact.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Using Website's Contact Forms to Deliver IcedID Malware","description":"Microsoft has warned organizations of a "unique" attack campaign that abuses contact forms published on websites to deliver malicious links to businesses via emails containing fake legal threats, in what's yet another instance of adversaries abusing legitimate infrastructure to mount evasive campaigns that bypass security protections.\n"The emails instruct recipients to click a link to review<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/zVzBu5SMqGo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/zVzBu5SMqGo/hackers-using-websites-contact-forms-to.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zVzBu5SMqGo/hackers-using-websites-contact-forms-to.html","updated_at":"2021-04-13T11:51:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zVzBu5SMqGo/hackers-using-websites-contact-forms-to.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"BRATA Malware Poses as Android Security Scanners on Google Play Store","description":"A new set of malicious Android apps have been caught posing as app security scanners on the official Play Store to distribute a backdoor capable of gathering sensitive information.\n"These malicious apps urge users to update Chrome, WhatsApp, or a PDF reader, yet instead of updating the app in question, they take full control of the device by abusing accessibility services," cybersecurity firm<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/cVz8kvM3if8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/cVz8kvM3if8/brata-malware-poses-as-android-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/cVz8kvM3if8/brata-malware-poses-as-android-security.html","updated_at":"2021-04-13T07:19:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/cVz8kvM3if8/brata-malware-poses-as-android-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"RCE Exploit Released for Unpatched Chrome, Opera, and Brave Browsers","description":"An Indian security researcher has publicly published a proof-of-concept (PoC) exploit code for a newly discovered flaw impacting Google Chrome and other Chromium-based browsers like Microsoft Edge, Opera, and Brave.\nReleased by Rajvardhan Agarwal, the working exploit concerns a remote code execution vulnerability in the V8 JavaScript rendering engine that powers the web browsers. It is believed<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xnTh85fU5Rk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xnTh85fU5Rk/rce-exploit-released-for-unpatched.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xnTh85fU5Rk/rce-exploit-released-for-unpatched.html","updated_at":"2021-04-13T06:33:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xnTh85fU5Rk/rce-exploit-released-for-unpatched.html","link_host":"thehackernews.com","from":"thehackernews"}]