RE: https://wandering.shop/@jkirkendall/116168259628861523
I never did use twitter before I came to mastodon, is there a word for when you follow a hashtag and find very different content than what you expected? #mastodon #rust #programming
What do you think as an essential non-technical skill for a software professional?
#softwareEngineers #programmers #womenwhocode #it #professionals #corporate #softwareDeveloper #softSkills #cpp #cplusplus #c #python #rust
I had an idea for a "very advanced clipboard manager" I’d love to build. In Rust, my new passion :))
Thought about it hard, searched around… couldn’t find anything similar
Even came up with a name: Pastry
So I check GitHub and there is a repo called pastry...
A clipboard manager!
With super advanced features!
Created one week ago!
Written in Rust!!!
https://github.com/osdodo/pastry/
I feel weirdly connected to this other dev 😅
Should I connect?
What's your go-to crate for async programming in Rust?
Rust zero-cost abstractions vs. SIMD 🦀
Nobody ever got fired for using a struct https://lobste.rs/s/lhlxor #rust
https://www.feldera.com/blog/nobody-ever-got-fired-for-using-a-struct
Rust zero-cost abstractions vs. SIMD https://lobste.rs/s/2gwqlh #performance #rust
https://turbopuffer.com/blog/zero-cost
I love #Rust! ❤️🦀
Hey #rustaceans, I wonder why #rust doesn't have standard random module. Everywhere I look, it says to use the rand #crate
I'm looking for something like random.randint() or random.choice() in python.
#Development #Findings
State of Rust 2025 · The 10th Rust survey reveals stability and steady growth https://ilo.im/16b22t
_____
#Survey #Programming #Community #Rust #WebAssembly #Browser #WebDev #Frontend #Backend
Ah, Claude—because who needs native apps when you can have the bloated glory of Electron? 🤦♂️💻 Spend $20k on a genius #Ccompiler in #Rust and then wrap it in an oversized JavaScript burrito. Genius! Clearly, native is as fashionable as dial-up internet. 🙄🚀
https://tonsky.me/blog/fall-of-native/ #Electron #NativeApps #Technology #Humor #HackerNews #ngated
I'm working on an image compression tool, written entirely in #rust #rustlang using iced.rs . Fully open source, of course. Check it out:
https://github.com/CodeDead/compressr-app
RE: https://mastodon.social/@pid_eins/116158472448002523
The varlink-http-bridge is another #systemd component written in #Rust. Expect more of that in the future.
I'm Arc-ing a lot today #rust
SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh
An extensive cyber espionage campaign conducted by SloppyLemming, an India-nexus threat actor, targeted government entities and critical infrastructure in Pakistan and Bangladesh from January 2025 to January 2026. The campaign used two attack vectors: PDF lures with ClickOnce execution chains and macro-enabled Excel documents. It deployed a custom x64 shellcode implant named BurrowShell and a Rust-based keylogger. The attackers extensively abused Cloudflare Workers for C2 and payload delivery, registering 112 domains impersonating government entities. The campaign focused on nuclear, defense, telecommunications, energy, and financial sectors, aligning with regional strategic competition in South Asia.
Pulse ID: 69a6c1d2775c55bd8367e527
Pulse Link: https://otx.alienvault.com/pulse/69a6c1d2775c55bd8367e527
Pulse Author: AlienVault
Created: 2026-03-03 11:11:14
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Asia #Bangladesh #Cloud #CyberSecurity #Espionage #Excel #Government #India #InfoSec #KeyLogger #Mac #OTX #OpenThreatExchange #PDF #Pakistan #RAT #Rust #ShellCode #SouthAsia #Telecom #Telecommunication #bot #AlienVault
RedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command
A malicious SMS spoofing campaign is spreading a fake version of Israel's 'Red Alert' emergency app amid ongoing conflict. The trojanized Android app, disguised as a trusted warning platform, can steal SMS, contacts, and location data while appearing legitimate. The campaign exploits public fear during crises to deploy mobile spyware. The malware uses sophisticated techniques to bypass security checks, including package manager hooking and dynamic payload loading. It mirrors the official app's interface but requests high-risk permissions. The malware continuously tracks GPS coordinates and exfiltrates data to attacker-controlled infrastructure, posing severe strategic and physical security risks. This campaign erodes trust in emergency response systems and could potentially be used for targeted attacks or to optimize missile targeting.
Pulse ID: 69a7014c0919cca0bf0d6d59
Pulse Link: https://otx.alienvault.com/pulse/69a7014c0919cca0bf0d6d59
Pulse Author: AlienVault
Created: 2026-03-03 15:42:04
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Android #CyberSecurity #InfoSec #Israel #Malware #OTX #OpenThreatExchange #RAT #Rust #SMS #SpyWare #Trojan #Troll #bot #AlienVault