Prepare the ol' faithful "LGTM"!
Prepare the ol' faithful "LGTM"!
How do you decide what to write next? | One Dev Question with Scott Hanselman. buff.ly/WprkpFW #programming #devcommunity #developers #blogging #dotnet
How do you decide what to write next? | One Dev Question with Scott Hanselman.
We do not provide evidence that:
- #AI systems do not currently speed up many or most #softwareDevelopers
- AI systems do not speed up individuals or groups in domains other than #softwareDevelopment
- AI systems in the near future will not speed up #developers
- There are not ways of using existing AI systems more effectively
> Measuring the Impact of Early-2025 AI on Experienced #OpenSource #Developer #Productivity
https://metr.org/blog/2025-07-10-early-2025-ai-experienced-os-dev-study/
A forced #Microsoft #Windows update gave me no option but to reboot even though I was in the middle of an important email
When I came back up #firefox had not only lost all my tabs through the History menu but **ALSO ALL MY PINNED TABS**
This is why people hate #software #developers
Meta and UK Government launch ‘Open Source AI Fellowship’ https://www.developer-tech.com/news/meta-and-uk-government-launch-open-source-ai-fellowship/ #meta #uk #europe #opensource #developers #politics #ai #tech #news #technology
Kubernetes developers are in demand! Boost your career with the CKAD certification.
Start with free courses:
LFS151 + LFS158
Save 40% on CKAD with a THRIVE-Annual bundle.
Level up with LFS253 + LFD259
Get certified. Grow your skills.
Start today → https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
The Solidity Language open-source package was used in a $500,000 crypto heist
A malicious extension for the Solidity programming language in the Cursor AI IDE led to a $500,000 cryptocurrency theft. The fake extension, downloaded 54,000 times, appeared higher in search results than the legitimate one due to ranking algorithm factors. It installed malware that downloaded PowerShell scripts, installed remote management software, and deployed data-stealing payloads. The attackers obtained wallet passphrases and stole cryptocurrency. Similar malicious packages were found targeting blockchain developers. The incident highlights the ongoing threat of malicious open-source packages in the crypto industry and the need for caution when downloading tools from package repositories.
Pulse ID: 6870b25f4c4c81689f7f0c75
Pulse Link: https://otx.alienvault.com/pulse/6870b25f4c4c81689f7f0c75
Pulse Author: AlienVault
Created: 2025-07-11 06:42:39
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
As a developer, you can contribute far more than just the code you write…
Technical skills will only take you so far...
Work on: Leadership (regardless of how senior or junior you are)
Collaborating effectively
Displaying vulnerability
Empathy for others
Showing humility
Communication
And you’ll go far
> When #developers are allowed to use #AI tools, they take 19% longer to complete issues—a significant slowdown that goes against #developer beliefs and expert forecasts. This gap between perception and reality is striking: developers expected AI to speed them up by 24%, and even after experiencing the slowdown, they still believed AI had sped them up by 20%.
https://metr.org/blog/2025-07-10-early-2025-ai-experienced-os-dev-study/
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
A new variant of macOS.ZuRu malware has been discovered, targeting users through a trojanized version of the Termius app. This backdoor, initially noted in 2021, now uses a modified Khepri C2 framework for post-infection operations. The malware is delivered via a .dmg disk image containing a hacked version of Termius.app. It adds two executables to the embedded Termius Helper.app and uses a new method to trojanize legitimate applications. The malware installs persistence via a LaunchDaemon and includes an md5 updater mechanism. The payload obtained from the C2 is a modified Khepri beacon with capabilities for file transfer, system reconnaissance, and command execution. The threat actor continues to target developers and IT professionals, adapting their techniques to evade detection.
Pulse ID: 686ffe0e4f96bdedcb713829
Pulse Link: https://otx.alienvault.com/pulse/686ffe0e4f96bdedcb713829
Pulse Author: AlienVault
Created: 2025-07-10 17:53:18
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Measuring the Impact of AI on Experienced Open-Source Developer Productivity
https://metr.org/blog/2025-07-10-early-2025-ai-experienced-os-dev-study/
Our next #JCON2025 session is live: 'Spoiled For Choice: #Limit Your Options' with Merlin Bögershausen
#Developers are spoiled for choice: #competing standards are vying to be the one true way you log, test, …
Grab your coffee and hit play: https://youtu.be/e80o0cECTAg
BREAKING: Someone mined 1.8M Hacker News headlines (read: clickbait) to discover that #developers like shiny things.
In other news, databases still exist, and people still write about them.
Oh, and don’t worry—there’s a free #tool you can use to achieve the same level of profound insight!
https://camelai.com/blog/hn-database-hype/ #HackerNews #Clickbait #DataMining #Insight #HackerNews #ngated