Lima

1_r/devopsish
vCenter Server vulnerability exploited for two years
There are no workarounds that remove the vulnerability, which allows unauthenticated remote command execution on vulnerable systems. A patch is available.
Microsoft says senior leadership team emails accessed in ‘nation-state’ hack tied to Russia
Hackers "gained access" to some employee email accounts, including some of senior leadership, according to an SEC filing.
Mosaic Wallpaper — Basic Apple Guy
Introducing Mosaic: A minimal abstract gradient wallpaper developed for the new Wireframe skin across the !Boring Suite of applications.
Why RTO mandates are layoffs in disguise, according to workplace experts: ‘Companies are daring employees to quit’
The need to induce soft layoffs could be driven by recession threats and changes related to consumer spending, workplace experts told CNBC Make It.
From 2-clicks to 1-Click: The untold origins on the making of the iTunes Music Store
The official account (and backstory) on the founding of Apple's content production team
ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities | CISA
This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 24-01: Mitigate Ivanti Connect Secure
Tesla hackers discover 'Elon Mode' that allows FULLY automated driving
Experts at Technische Universität Berlin hacked the circuit board of Tesla's Autopilot, its driver assistance system.
Add GPL information · id-Software/DOOM@a77dfb9
DOOM Open Source Release. Contribute to id-Software/DOOM development by creating an account on GitHub.
Linux 6.8 Landing A Tantalizing Optimization For Common $PATH-Based Searches
For the execve() system call to execute a program by pathname, the Linux 6.8 kernel is set to land a new optimization to 'dramatically' speed-up PATH searches.
The Tiny Stack (Astro, SQLite, Litestream)
A simple, robust, and minimal stack for building web applications with Astro, SQLite, and Litestream.
missing the point of webassembly — wingolog
wingolog: article: missing the point of webassembly
Sheryl Sandberg to leave Meta board | CNN Business
Former longtime Meta chief operating officer Sheryl Sandberg will not remain on the company’s board after her term ends in May, she said in a Facebook post Wednesday.
OpenAI must defend ChatGPT fabrications after failing to defeat libel suit
ChatGPT users may soon learn whether false outputs will be allowed to ruin lives.
That’s never happened before: Games Done Quick video stars speedrunning dog
The Shiba Inu was trained to use a custom controller in a game meant for a robot.
PostgreSQL Added as CVE Numbering Authority (CNA)
PostgreSQL Added as CVE Numbering Authority (CNA)
VMware is killing off 56 products amid "tectonic" infrastructure shift
Goodbye vSphere Hypervisor. Goodbye Aria Operations. Goodbye NCX. Goodbye HCX. Goodbye more acronyms than we know what to do with; though Broadcom does.
How Federico Viticci Modded Their iPad Pro showing everyone that the iPad isn't ready to be a replacement for anything
Those who have been reading MacStories for a few years should know something about me: I love modding things. Whether it’s customizing the silicone tips of AirPods Pro or adding kickstands to iPad covers (which I don’t do anymore), there’s something about the idea of taking an object and modding it specifically to my needs
Intro to Sidecars - Containerized Adventures
Around the 1.29 release, I started hearing lots of questions about sidecars. Let's get everyone up to speed with a brief Intro to Sidecars!
LeftoverLocals: Listening to LLM responses through leaked GPU local memory
By Tyler Sorensen and Heidy Khlaaf We are disclosing LeftoverLocals: a vulnerability that allows recovery of data from GPU local memory created by another process on Apple, Qualcomm, AMD, and Imagi…
AI girlfriend bots are already flooding OpenAI’s GPT store
OpenAI’s store rules are already being broken, illustrating that regulating GPTs could be hard to control
How Walmart’s Financial Services Became a Fraud Magnet
Scammers have duped consumers out of more than $1 billion by exploiting Walmart’s lax security. The company has resisted taking responsibility while breaking promises to regulators and skimping on training.
How a 27-Year-Old Codebreaker Busted the Myth of Bitcoin’s Anonymity
Once, drug dealers and money launderers saw cryptocurrency as perfectly untraceable. Then a grad student named Sarah Meiklejohn proved them all wrong—and set the stage for a decade-long crackdown.
Google now admits it could collect data in Chrome's Incognito mode
Google has updated its disclaimer in Chrome's experimental Canary channel shortly after agreeing to settle a $5 billion lawsuit accusing it of tracking Incognito users.
Demo: Rapid Vulnerability Remediation with Slim.ai
In this demo, Slim.ai's Ian Riopel shows how the platform, now in beta, offers users a shared workspace for coordinating vulnerability fixes with software vendors.
Number Usage in Passwords - SANS Internet Storm Center
Number Usage in Passwords, Author: Jesse La Grew
~5 Minutes Of Coding Yields A 6%+ Boost To Linux I/O Performance
IO_uring creator and Linux block subsystem maintainer Jens Axboe spent about five minutes working on two patches to implement caching for issue-side time querying in the block layer and can yield 6% or more better I/O performance.
rwasa | 2 Ton Digital
ryanoasis/nerd-fonts: Iconic font aggregator, collection, & patcher. 3,600+ icons, 50+ patched fonts: Hack, Source Code Pro, more. Glyph collections: Font Awesome, Material Design Icons, Octicons, & more
Iconic font aggregator, collection, & patcher. 3,600+ icons, 50+ patched fonts: Hack, Source Code Pro, more. Glyph collections: Font Awesome, Material Design Icons, Octicons, & more...
86-DOS Revisited | OS/2 Museum