mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#rust

284 posts227 participants37 posts today

Watch the first trailer for #Rust, the long delayed Western drama film set in 1880s Kansas, starring #AlecBaldwin.

Directed by Joel Souza, Baldwin stars as Harland Rust, a notorious outlaw who emerges from hiding to rescue his 13-year-old grandson from execution after a tragic accident.

Rust is set for release on May 2, 2025, in select theaters and digital.

🔗vimooz.me/gqyaf2

I wrote a #rust blog that explores some neat patterns that @rain mentioned on an Oxide and Friends episode. Learn how the Daft crate implements the ability to emit code and errors simultaneously and how they accumulate as many errors as possible for an improved Derive proc-macro experience.

schneems.com/2025/03/26/a-daft

schneems.comA Daft proc-macro trick: How to Emit Partial-Code + ErrorsA recent Oxide and Friends podcast episode, “A crate is born,” detailed the creation of a proc macro for deriving “diffable” data structures with a trick I w...

What they don't tell you about using #Rust in a big corporation:

You'll most likely be writing "lowest common denominator code" and will rarely if ever get to use the full expressiveness of the language or the compiler to make for a more pleasant and safer development experience

Man, I wish we had the equivalent of Jon Gjengset's outstanding "De-crusting The $X Crate" #rust videos for #python #pypi packages.

The format is beautiful. Let's peel back the covers on some code library we all use and REALLY understand what's going on under the covers.

Am I missing out? Is there somebody out there doing work like this? Please throw me a line if you're in the know :) Thanks!

Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants

ReaderUpdate, a macOS malware loader platform active since 2020, has evolved to include variants written in Crystal, Nim, Rust, and now Go programming languages. Originally a compiled Python binary, the malware has been largely dormant until late 2024. The loader is capable of executing remote commands, potentially offering Pay-Per-Install or Malware-as-a-Service. It collects system information, creates persistence mechanisms, and communicates with command and control servers. The Go variant, less common than others, uses string obfuscation techniques to hinder analysis. While currently associated with adware delivery, the loader's capabilities pose a potential threat for more malicious payloads in the future.

Pulse ID: 67e41bedc264bcc69a9b8e20
Pulse Link: otx.alienvault.com/pulse/67e41
Pulse Author: AlienVault
Created: 2025-03-26 15:23:25

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.