The new #apt version in #Debian unstable is SO GOOD.
If you run Debian or a derivative, I recommend grabbing it from somewhere and giving it a spin.
The "Space needed" overview needs some UX love as it shows kB/MB/GB next to each other without making the relations obvious at a glance. But other than that... sooo good.
Embarrassed to say that the only reason I won't try an #Arch based #linux#distro is because I'm so used to #apt I can't bring myself to try another #packagemanager.
I updated to #Ubuntu 22.04 yesterday and got a little notification that my #apt Firefox was being switched to #snap. Weird flex, but okay.
Today, when I tried to open my local #Rust documentation with rustup doc --book, I got a page that said that the access to the file was denied.
It turns out that #snap prevents firefox opening files in hidden folders and the best workaround is to create a symbolic link to a non-hidden folder. WTH?
@manpacket I saw this last week and finally made the switch when I found that #snap#firefox could not open pages from the /tmp/ directory (snap: 2, me: 0)
I don't understand what is the point of releasing an IDE via #flatpak, when that flatpak doesn't include all the necessary dev tools, and it can't access the ones outside its sandboxing. Honestly. What's the point? I'm looking at you, #Geany.
Personally, I can't stand flatpaks or #snap. #Appimage is nicer just because it's just one delete away from within the file manager and doesn't leave crumbs everywhere. But overall, I prefer #apt, and #dnf.
Rumint is that the Change Healthcare was Chinese espionage that was caught and they overreacted and turned off all systems thinking ransomware was going to be deployed.
This fits with Chinese targeting of healthcare and pharmacies in the past. My assessment is that it could also be Russian long term staging or espionage as they are also known to target healthcare and pharmacies.
Check Point highlights the persistent threat of malicious Word/Excel Documents (maldocs):
Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802.
Widespread Use by Cybercriminals: These vulnerabilities are exploited by well-known malware such as GuLoader, Agent Tesla, Formbook, and others. APT groups also got on the list, with Gamaredon APT being a notable example. They target lucrative sectors like finance, government, and healthcare, indicating a strategic approach by attackers.
Challenges in Detection: Despite their age, these MalDocs can evade detection due to their sophisticated construction and the use of various tricks to bypass security measures.