Search built for developers

Multi-index, developer-first results

4SEARCH.dev is a focused search engine for developer queries. It blends proprietary indexes, curated sources, and AI to surface relevant code samples, documentation, tool pages, and vendor info. Whether you are debugging, researching a library, or comparing tools for procurement, 4SEARCH.dev reduces noise and helps you find what developers actually need. Use the home page to start broad searches, explore curated categories, or jump to specialized web, news, shopping, and AI chat features. Part of the 4SEARCH network of topic specific search engines.

Latest News & Web Pages

CIO
cio. com > article > 4167999 > when-ai-writes-code-it-joins-the-software-supply-chain. html

When AI writes code, it joins the software supply chain

1+ hour, 34+ min ago  (978+ words) AI tools designed to assist developers are no longer staying in the background. They are starting to shape what actually gets built and deployed. They open pull requests. They interact directly with repositories and CI/CD pipelines. At some point,…...

Tech Nadu
technadu. com > malicious-nuget-packages-target-chinese-net-ecosystem-developers > 627373

Malicious Nu Get Packages Target. NET Developers in China

2+ hour, 51+ min ago  (256+ words) This supply chain campaign specifically targets developers operating within Chinese enterprise. NET ecosystems, exposing tens of thousands of developer workstations and CI/CD build servers to the risk of credential and crypto wallet theft. The malicious packages are designed to…...

Laodong. vn
news. laodong. vn > cong-nghe > thoi-diem-thue-bao-bi-khoa-hai-chieu-neu-chua-xac-thuc-1697774. ldo

Time when subscribers are two-way locked if not verified

32+ min ago  (205+ words) However, along with many people discovering that SIMs are locked and calling out, another question is also starting to appear more and more: "When will two-way locking occur? According to Mr. Long, he had received the notice before, but due…...

Google News
cyberpress. org > voip-recycling-bypasses-filters

Vo IP Number Recycling Helps Scammers Bypass Reputation Filters

1+ hour, 41+ min ago  (309+ words) Telephone-oriented attack delivery remains a prevalent tactic in modern email threats, prompting security researchers to pivot their detection methods. Cisco Talos has recently expanded its threat intelligence capabilities to track phone numbers embedded within malicious emails as a critical indicator…...

@phoronix
phoronix. com > news > KDE-Plasma-Faster-WL-SHM

KDE Plasma 6. 7 To Provide A Much Better Experience For CPU-Based Rendering

5+ min ago  (239+ words) KDE developer Xaver Hugl has whipped up another nice improvement for the upcoming Plasma 6. 7 desktop release. Due to Qt Widgets still relying on CPU-based rendering and finding the performance subpar with Wayland shared memory "wl_shm" usage, Xaver has leveraged UDMABUF for…...

@phoronix
phoronix. com > news > GCC-WASM-Web Assembly

New GCC Back-End Proposed For Web Assembly

17+ min ago  (225+ words) When it comes to compiling C/C++ code to Web Assembly (WASM), LLVM/Clang and other LLVM-based tooling has dominated the space. Nearly a decade ago was a proposal for a GCC Web Assembly back-end that ultimately never ended up…...

Cybersecurity Insiders
cybersecurity-insiders. com-insiders. com

UK Financial Services Sector Tests Cyber Resilience in High-Pressure Security Hackathon

1+ hour, 33+ min ago  (266+ words) Financial institutions, fintech firms, technology vendors and regulators from across the UK financial sector gathered on April 27-28 for a cybersecurity competition focused on evaluating operational readiness, rapid decision-making and the ability to defend critical financial infrastructure against advanced cyber threats....

We Live Security
welivesecurity. com > en > cybersecurity > fixing-password-problem-as-easy-as-123456

Fixing trivial passwords is as easy as 123456

3+ hour, 7+ min ago  (448+ words) How come it's still possible to "secure' an online account with a six-digit string? The most-used password globally is exactly what you think it is: "123456.' That's according to Nord Pass's latest annual report on passwords exposed in data breaches globally....

Cyber Security News
cybersecuritynews. com > malicious-nuget-packages-target-browser-credentials

Malicious Nu Get Packages Target Browser Credentials, SSH Keys, and Crypto Wallets

44+ min ago  (626+ words) A fresh wave of malicious packages has been quietly spreading through the Nu Get ecosystem, one of the most widely used registries in the. NET developer world. Five rogue packages have been discovered posing as legitimate Chinese software libraries, secretly…...

Caucasian Knot
eng. kavkaz-uzel. eu-uzel. eu

The Ministry of Digital Development of Dagestan announced the shutdown of mobile internet services.

11+ hour, 42+ min ago  (214+ words) Due to preparations for holiday events, mobile internet service in Dagestan will be limited on May 7 and 9, the republic's Ministry of Digital Development announced. As reported by the "Caucasian Knot," in early 2025, mobile internet outages affected various regions of southern…...