Code & Design News Aggregator of Code, Security and Design news sites. Fri, 30 Sep 2022 15:41:45 +0000 NYC Proposal Offers Cash for Spotting Parking Violations in Bike Lanes <a href="">Comments</a> Fri, 30 Sep 2022 15:20:59 +0000 2022-09-30T15:20:59+00:00 New Malware Families Found Targeting VMware ESXi Hypervisors Threat actors have been found deploying never-before-seen post-compromise implants in VMware's virtualization software to seize control of infected systems and evade detection. Google's Mandiant threat intelligence division referred to it as a "novel malware ecosystem" that impacts VMware ESXi, Linux vCenter servers, and Windows virtual machines, allowing attackers to maintain persistent access Fri, 30 Sep 2022 14:42:00 +0000 2022-09-30T14:42:00+00:00 US Government plans to develop AI that can unmask anonymous writers <a href="">Comments</a> Fri, 30 Sep 2022 13:59:35 +0000 2022-09-30T13:59:35+00:00 USB Charger (USB Power Delivery) <a href="">Comments</a> Fri, 30 Sep 2022 13:38:53 +0000 2022-09-30T13:38:53+00:00 OpenStreepMap 2012 vs. 2022 <a href="">Comments</a> Fri, 30 Sep 2022 13:34:13 +0000 2022-09-30T13:34:13+00:00 Red Dead Redemption 2 fan with 6k hours on Stadia begs for character transfer <a href="">Comments</a> Fri, 30 Sep 2022 13:25:53 +0000 2022-09-30T13:25:53+00:00 Cloudflare Radar 2.0 <a href="">Comments</a> Fri, 30 Sep 2022 13:09:12 +0000 2022-09-30T13:09:12+00:00 Steampipe – Select * from Cloud; <a href="">Comments</a> Fri, 30 Sep 2022 13:08:10 +0000 2022-09-30T13:08:10+00:00 Euro zone inflation soars to a record 10%, piling pressure on the ECB <a href="">Comments</a> Fri, 30 Sep 2022 13:03:25 +0000 2022-09-30T13:03:25+00:00 Voxel versions of classic paintings Fri, 30 Sep 2022 12:39:02 +0000 2022-09-30T12:39:02+00:00 Cyber Attacks Against Middle East Governments Hide Malware in Windows logo An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously undocumented backdoor in a Windows logo in its attacks against Middle Eastern governments. Broadcom's Symantec Threat Hunter Team attributed the updated tooling to a hacking group it tracks under the name Witchetty, which is also known as LookingFrog, a subgroup operating under the TA410 Fri, 30 Sep 2022 11:52:00 +0000 2022-09-30T11:52:00+00:00 We worked for 4 months to build a port for Stadia and today we finished it <a href="">Comments</a> Fri, 30 Sep 2022 11:13:47 +0000 2022-09-30T11:13:47+00:00 A call to reconsider memory address-space isolation in Linux <a href="">Comments</a> Fri, 30 Sep 2022 11:03:47 +0000 2022-09-30T11:03:47+00:00 Rust Nation – A UK Conference for Rustaceans <a href="">Comments</a> Fri, 30 Sep 2022 10:57:36 +0000 2022-09-30T10:57:36+00:00 Show HN: Red Goose – Convert your website to mobile app <a href="">Comments</a> Fri, 30 Sep 2022 10:28:42 +0000 2022-09-30T10:28:42+00:00 New Malware Campaign Targeting Job Seekers with Cobalt Strike Beacons A social engineering campaign leveraging job-themed lures is weaponizing a years-old remote code execution flaw in Microsoft Office to deploy Cobalt Strike beacons on compromised hosts. "The payload discovered is a leaked version of a Cobalt Strike beacon," Cisco Talos researchers Chetan Raghuprasad and Vanja Svajcer said in a new analysis published Wednesday. "The beacon configuration contains Fri, 30 Sep 2022 10:20:00 +0000 2022-09-30T10:20:00+00:00 Why Organisations Need Both EDR and NDR for Complete Network Protection Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks and use their resources for their day-to-day work. However, they also expand the attack surface and make the organisation vulnerable to malicious cyberattacks and data breaches. Why Modern Organisations Need EDR According to the 2020 global risk report by Ponemon Institute, smartphones, Fri, 30 Sep 2022 10:10:00 +0000 2022-09-30T10:10:00+00:00 Reducing logging cost by two orders of magnitude using CLP <a href="">Comments</a> Fri, 30 Sep 2022 10:08:53 +0000 2022-09-30T10:08:53+00:00 North Korean Hackers Weaponizing Open-Source Software in Latest Cyber Attacks A "highly operational, destructive, and sophisticated nation-state activity group" with ties to North Korea has been weaponizing open source software in their social engineering campaigns aimed at companies around the world since June 2022. Microsoft's threat intelligence teams, alongside LinkedIn Threat Prevention and Defense, attributed the intrusions with high confidence to Zinc, which is Fri, 30 Sep 2022 10:02:00 +0000 2022-09-30T10:02:00+00:00 A step-by-step guide to our solar system’s demise <a href="">Comments</a> Fri, 30 Sep 2022 09:43:56 +0000 2022-09-30T09:43:56+00:00 New integer types I’d like to see <a href="">Comments</a> Fri, 30 Sep 2022 09:30:05 +0000 2022-09-30T09:30:05+00:00 Microsoft Confirms 2 New Exchange Zero-Day Flaws Being Used in the Wild Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and 2019 following reports of in-the-wild exploitation. "The first vulnerability, identified as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is Fri, 30 Sep 2022 09:01:00 +0000 2022-09-30T09:01:00+00:00 DreamFusion: Text-to-3D using 2D Diffusion Fri, 30 Sep 2022 08:43:46 +0000 2022-09-30T08:43:46+00:00 Google has added ads on both its search page and Chrome://newtab <a href="">Comments</a> Fri, 30 Sep 2022 08:35:46 +0000 2022-09-30T08:35:46+00:00 What is No-Code? The Best Tools to Get Started Fri, 30 Sep 2022 07:32:23 +0000 2022-09-30T07:32:23+00:00 Iollo (YC S22) is hiring a founding full-stack engineer <a href="">Comments</a> Fri, 30 Sep 2022 07:00:41 +0000 2022-09-30T07:00:41+00:00 Introduction to the Theory of Programming Languages (1991) <a href="">Comments</a> Fri, 30 Sep 2022 06:42:13 +0000 2022-09-30T06:42:13+00:00 WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems. That's according to Vietnamese cybersecurity company GTSC, which discovered the shortcomings as part of its security monitoring and incident response efforts in August 2022. The Fri, 30 Sep 2022 04:25:00 +0000 2022-09-30T04:25:00+00:00 Go Micro: a standard library for distributed systems development <a href="">Comments</a> Fri, 30 Sep 2022 03:38:13 +0000 2022-09-30T03:38:13+00:00 MDM: Human Motion Diffusion Model <a href="">Comments</a> Fri, 30 Sep 2022 01:01:59 +0000 2022-09-30T01:01:59+00:00 Numerous orgs hacked after installing weaponized open source apps PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording all targeted. Thu, 29 Sep 2022 22:06:48 +0000 2022-09-29T22:06:48+00:00 Why “go nuts, show nuts” doesn’t work in 2022 <a href="">Comments</a> Thu, 29 Sep 2022 19:00:28 +0000 2022-09-29T19:00:28+00:00 DreamFusion: Text-to-3D using 2D Diffusion <a href="">Comments</a> Thu, 29 Sep 2022 18:57:24 +0000 2022-09-29T18:57:24+00:00 Meta announces Make-A-Video, which generates video from text Using a text description or an existing image, Make-A-Video can render video on demand. Thu, 29 Sep 2022 15:39:01 +0000 2022-09-29T15:39:01+00:00 Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to steal money by means of fraudulent transactions. "The Prilex group has shown a high level of knowledge about credit and debit card transactions, and how software used for payment processing works," Kaspersky researchers said. "This enables the attackers to keep Thu, 29 Sep 2022 14:15:00 +0000 2022-09-29T14:15:00+00:00 Make-A-Video: AI system that generates videos from text <a href="">Comments</a> Thu, 29 Sep 2022 13:16:50 +0000 2022-09-29T13:16:50+00:00 Obscure election will decide the fate of the open internet <a href="">Comments</a> Thu, 29 Sep 2022 12:37:24 +0000 2022-09-29T12:37:24+00:00 Looped Square Or ⌘ <a href="">Comments</a> Thu, 29 Sep 2022 12:23:30 +0000 2022-09-29T12:23:30+00:00 Researchers Uncover Covert Attack Campaign Targeting Military Contractors A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to deploy an unknown payload on compromised machines. The highly-targeted intrusions, dubbed STEEP#MAVERICK by Securonix, also targeted a strategic supplier to the F-35 Lightning II fighter aircraft. "The attack was carried out Thu, 29 Sep 2022 12:00:00 +0000 2022-09-29T12:00:00+00:00 Native Linux GPU Driver for Apple M1 <a href="">Comments</a> Thu, 29 Sep 2022 11:53:42 +0000 2022-09-29T11:53:42+00:00 Five Steps to Mitigate the Risk of Credential Exposure Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft.  While CISOs are aware of growing identity threats and have multiple tools in their arsenal to help reduce the potential risk, the Thu, 29 Sep 2022 11:45:00 +0000 2022-09-29T11:45:00+00:00 Swachh City Platform Suffers Data Breach Leaking 16 Million User Records A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting 16 million users of Swachh City, an Indian complaint redressal platform. Leaked details include usernames, email addresses, password hashes, mobile numbers, one-time passwords, last logged-in times, and IP addresses, among others, according to a report shared by security firm CloudSEK Thu, 29 Sep 2022 10:12:00 +0000 2022-09-29T10:12:00+00:00 Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amid ongoing unrest in the country following the death of Mahsa Amini in custody. "Key activities are data leaking and selling, including officials' phone numbers and emails, and maps of sensitive locations," Israeli cybersecurity firm Check Point said in Thu, 29 Sep 2022 09:56:00 +0000 2022-09-29T09:56:00+00:00 Operational process automation for Design Agencies Thu, 29 Sep 2022 08:14:51 +0000 2022-09-29T08:14:51+00:00 Peep: The Network Auralizer <a href="">Comments</a> Thu, 29 Sep 2022 06:58:54 +0000 2022-09-29T06:58:54+00:00 Intel announces new FPGA families <a href="">Comments</a> Thu, 29 Sep 2022 06:29:59 +0000 2022-09-29T06:29:59+00:00 Fossils reveal the deep roots of jawed vertebrates <a href="">Comments</a> Thu, 29 Sep 2022 02:56:51 +0000 2022-09-29T02:56:51+00:00 Elixir Sulfanilamide <a href="">Comments</a> Thu, 29 Sep 2022 00:16:11 +0000 2022-09-29T00:16:11+00:00 Never-before-seen malware has infected hundreds of Linux and Windows devices Small office routers? FreeBSD machines? Enterprise servers? Chaos infects them all. Wed, 28 Sep 2022 23:48:03 +0000 2022-09-28T23:48:03+00:00 Cloudflare’s CAPTCHA replacement lacks crosswalks, checkboxes, Google Cloud giant says its verification tool doesn't challenge or profile users. Wed, 28 Sep 2022 20:00:18 +0000 2022-09-28T20:00:18+00:00 DALL-E image generator is now open to everyone DALL-E launched frenzy of image synthesis development but was invitation-only until now. Wed, 28 Sep 2022 17:33:13 +0000 2022-09-28T17:33:13+00:00 Google Fiber touts 20Gbps download speed in test, promises eventual 100Gbps Google Fiber test delivered 20.2Gbps downloads to exec's home in Kansas City. Wed, 28 Sep 2022 17:25:19 +0000 2022-09-28T17:25:19+00:00 Serious vulnerabilities in Matrix’s end-to-end encryption have been patched Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages. Wed, 28 Sep 2022 16:00:27 +0000 2022-09-28T16:00:27+00:00 Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems A new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare a wide range of Windows, Linux, small office/home office (SOHO) routers, and enterprise servers into its botnet. "Chaos functionality includes the ability to enumerate the host environment, run remote shell commands, load additional modules, automatically propagate through Wed, 28 Sep 2022 14:00:00 +0000 2022-09-28T14:00:00+00:00 Houses Of - A travel, photography and design passion project showcasing charismatic houses around the world Wed, 28 Sep 2022 13:25:32 +0000 2022-09-28T13:25:32+00:00 Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). "This campaign features enhancements and a shift toward LNK (Windows shortcut) files when compared to similar attacks in the past," Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a Tuesday write-up. <!--adsense--> Sold on the dark web for € Wed, 28 Sep 2022 12:36:00 +0000 2022-09-28T12:36:00+00:00 Improve your security posture with Wazuh, a free and open source XDR Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find the right tools that help achieve a good posture. In many cases, organizations work with tools that do not integrate with each other and are expensive to purchase and maintain. Security posture management is a term used to describe the process of Wed, 28 Sep 2022 12:15:00 +0000 2022-09-28T12:15:00+00:00 We interviewed Linux OS through an AI bot to discover its secrets In the world's first operating system interview, Linux tells all about Windows, Torvalds, and its favorite distro. Wed, 28 Sep 2022 11:00:08 +0000 2022-09-28T11:00:08+00:00 Hackers Using PowerPoint Mouseover Trick to Infect System with Malware The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware. The technique "is designed to be triggered when the user starts the presentation mode and moves the mouse," cybersecurity firm Cluster25 said in a technical report. "The code execution runs a Wed, 28 Sep 2022 10:09:00 +0000 2022-09-28T10:09:00+00:00 Facebook Shuts Down Covert Political 'Influence Operations' from Russia and China Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China and Russia for engaging in coordinated inauthentic behavior (CIB) so as to manipulate public debate. While the Chinese operation sets its sights on the U.S. and the Czech Republic, the Russian network primarily targeted Germany, France, Italy, Ukraine and the U.K. with themes Wed, 28 Sep 2022 08:45:00 +0000 2022-09-28T08:45:00+00:00 Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution on vulnerable devices. One of them concerns CVE-2022-36934 (CVSS score: 9.8), a critical integer overflow vulnerability in WhatsApp that results in the execution of arbitrary code simply by establishing a video call. The issue impacts the WhatsApp and Wed, 28 Sep 2022 05:03:00 +0000 2022-09-28T05:03:00+00:00 Better than JPEG? Researcher discovers that Stable Diffusion can compress images Lossy compression bypasses text-to-image portions of Stable Diffusion with interesting results. Tue, 27 Sep 2022 20:59:25 +0000 2022-09-27T20:59:25+00:00 7 Non Technical Interview Questions To Evaluate The Candidate Tue, 27 Sep 2022 14:21:43 +0000 2022-09-27T14:21:43+00:00 Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures The Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in the country and that of its allies. The attacks are said to be targeting the energy sector, the Main Directorate of Intelligence of the Ministry of Defense of Ukraine (GUR) said. "By the cyberattacks, the enemy will try to increase the effect of missile strikes on Tue, 27 Sep 2022 13:54:00 +0000 2022-09-27T13:54:00+00:00 Apps can pose bigger security, privacy threat based on where you download them Same app, different risks if you download it in, say, Tunisia rather than in Germany. Tue, 27 Sep 2022 13:53:58 +0000 2022-09-27T13:53:58+00:00 New NullMixer Malware Campaign Stealing Users' Payment Data and Credentials Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called NullMixer on compromised systems. "When a user extracts and executes NullMixer, it drops a number of malware files to the compromised machine," cybersecurity firm Kaspersky said in a Monday report. "It drops a wide variety Tue, 27 Sep 2022 13:19:00 +0000 2022-09-27T13:19:00+00:00 Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme As many as 75 apps on Google Play and 10 on Apple App Store have been discovered engaging in ad fraud as part of an ongoing campaign that commenced in 2019. The latest iteration, dubbed Scylla by Online fraud-prevention firm HUMAN Security, follows similar attack waves in August 2019 and late 2020 that go by the codename Poseidon and Charybdis, respectively. Prior to their removal from the app Tue, 27 Sep 2022 12:04:00 +0000 2022-09-27T12:04:00+00:00 Why Continuous Security Testing is a Must for Organizations Today The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow from $172.5 billion in 2022 to $267.3 billion in 2026.  One big area of spending includes the art of putting cybersecurity defenses under pressure, commonly known as security testing. MarketsandMarkets forecasts the global Tue, 27 Sep 2022 11:39:00 +0000 2022-09-27T11:39:00+00:00 North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs The infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware targeting Apple's macOS operating system. In the latest variant of the campaign observed by cybersecurity company SentinelOne last week, decoy documents advertising positions for the Singapore-based cryptocurrency exchange firm Crypto[.]com have been used to mount the attacks. The Tue, 27 Sep 2022 09:46:00 +0000 2022-09-27T09:46:00+00:00 Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following the hack of telecom provider Optus. "Operation Hurricane has been launched to identify the criminals behind the alleged breach and to help shield Australians from identity fraud," the AFP said in a statement. The Tue, 27 Sep 2022 06:14:00 +0000 2022-09-27T06:14:00+00:00 BeReal: 5 Ways the Anti-Social Media App is Changing the Game Mon, 26 Sep 2022 22:36:50 +0000 2022-09-26T22:36:50+00:00 Russia plans “massive cyberattacks” on critical infrastructure, Ukraine warns Distributed denial-of-service attacks are also likely to increase, advisory says. Mon, 26 Sep 2022 19:14:57 +0000 2022-09-26T19:14:57+00:00 Darth Vader’s voice will be AI-generated from now on Using Respeecher, Vader will live on as a cloned voice effect performed by another actor. Mon, 26 Sep 2022 15:21:43 +0000 2022-09-26T15:21:43+00:00 Researchers Identify 3 Hacktivist Groups Supporting Russian Interests At least three alleged hacktivist groups working in support of Russian interests are likely doing so in collaboration with state-sponsored cyber threat actors, according to Mandiant. The Google-owned threat intelligence and incident response firm said with moderate confidence that "moderators of the purported hacktivist Telegram channels 'XakNet Team,' 'Infoccentr,' and 'CyberArmyofRussia_Reborn Mon, 26 Sep 2022 14:33:00 +0000 2022-09-26T14:33:00+00:00 Visual Hierarchy Guide: 7 steps to clean design Mon, 26 Sep 2022 10:57:27 +0000 2022-09-26T10:57:27+00:00 NES games remastered with Stable Diffusion img2img Mon, 26 Sep 2022 09:47:33 +0000 2022-09-26T09:47:33+00:00 What Is Design Thinking? Definition, Process And Examples Fri, 23 Sep 2022 21:27:01 +0000 2022-09-23T21:27:01+00:00 How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000 For 2nd time in 4 years, Amazon loses control of its IP space in BGP hijacking. Fri, 23 Sep 2022 18:04:11 +0000 2022-09-23T18:04:11+00:00 Starlink is getting a lot slower as more people use it, speed tests show Starlink capacity limits hit users—SpaceX says more satellites will make it faster. Fri, 23 Sep 2022 17:57:20 +0000 2022-09-23T17:57:20+00:00 The Future Of Design Is Open Source, Thanks To Figma Fri, 23 Sep 2022 10:37:51 +0000 2022-09-23T10:37:51+00:00 Will Adobe ruin Figma? Fri, 23 Sep 2022 09:23:10 +0000 2022-09-23T09:23:10+00:00 Artist receives first known US copyright registration for latent diffusion AI art Registration of AI-assisted comic comes amid fierce online debate about AI art ethics. Thu, 22 Sep 2022 21:38:04 +0000 2022-09-22T21:38:04+00:00 AI model from OpenAI automatically recognizes speech and translates it to English "Whisper" open source model may become a building block in future speech-to-text apps. Thu, 22 Sep 2022 16:48:28 +0000 2022-09-22T16:48:28+00:00 What is video proofing and online proofing for designers? Thu, 22 Sep 2022 15:00:38 +0000 2022-09-22T15:00:38+00:00 Fearing copyright issues, Getty Images bans AI-generated artwork Getty sidesteps potential legal problems from unresolved rights and ethics issues. Wed, 21 Sep 2022 22:32:35 +0000 2022-09-21T22:32:35+00:00 The record-setting DDoSes keep coming, with no end in sight As DDoSes continue to innovate, their attacks grow ever bigger. Wed, 21 Sep 2022 19:15:20 +0000 2022-09-21T19:15:20+00:00 Artist finds private medical record photos in popular AI training data set LAION scraped medical photos for AI research use. Who's responsible for taking them down? Wed, 21 Sep 2022 15:43:09 +0000 2022-09-21T15:43:09+00:00 Run Stable Diffusion AI on Low-End Device & Tablet Wed, 21 Sep 2022 13:24:26 +0000 2022-09-21T13:24:26+00:00 $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned "Astonishing failures" over a 5-year span. Tue, 20 Sep 2022 21:22:34 +0000 2022-09-20T21:22:34+00:00 The Principles and Laws of UX Design – Why Every Designer Should Know Them Tue, 20 Sep 2022 09:58:52 +0000 2022-09-20T09:58:52+00:00 Instaprice - the pricing calculator for freelance projects Mon, 19 Sep 2022 15:52:29 +0000 2022-09-19T15:52:29+00:00 All Together Festival by Bank of Ireland had awesome visual this year. Check it out. Mon, 19 Sep 2022 10:19:51 +0000 2022-09-19T10:19:51+00:00 Show DN: I made 7,000+ images with DALL-E 2 to create a reference/inspiration table Sun, 18 Sep 2022 14:50:41 +0000 2022-09-18T14:50:41+00:00 New Bravorizer Figma Plugin! Fri, 16 Sep 2022 14:18:12 +0000 2022-09-16T14:18:12+00:00 A book about Product Design Psychology? Fri, 16 Sep 2022 13:26:06 +0000 2022-09-16T13:26:06+00:00 Making a Comic Book Page with Midjourney AI Fri, 16 Sep 2022 12:55:42 +0000 2022-09-16T12:55:42+00:00 Wanna Organize your UX Research Visually? Fri, 16 Sep 2022 08:56:47 +0000 2022-09-16T08:56:47+00:00 Adobe acquires Figma, cue the memes :P Thu, 15 Sep 2022 17:17:12 +0000 2022-09-15T17:17:12+00:00 The end of product copy errors in production. Connect the design process with the codebase ⚡️ Thu, 15 Sep 2022 07:14:56 +0000 2022-09-15T07:14:56+00:00 Today we are in Product Hunt with Bravo Studio 3.11 apps for work! Wed, 14 Sep 2022 13:49:23 +0000 2022-09-14T13:49:23+00:00