[-] 0xCBE@infosec.pub 1 points 1 year ago

You build a derivation yourself... which I never do. I am on mac so I brew install and orchestrate brew from home manager. I find it works good as a compromise.

3
4
3
2
3

cross-posted from: https://infosec.pub/post/397812

Automated Audit Log Forensic Analysis (ALFA) for Google Workspace is a tool to acquire all Google Workspace audit logs and perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework.

By Greg Charitonos and BertJanCyber

1
5

We’ve made a few changes to the way we host and distribute our Images over the last year to increase security, give ourselves more control over the distribution, and most importantly to keep our costs under control [...]

6

This first post in a 9-part series on Kubernetes Security basics focuses on DevOps culture, container-related threats and how to enable the integration of security into the heart of DevOps.

2
5
1
submitted 1 year ago by 0xCBE@infosec.pub to c/redteam@infosec.pub
3
[-] 0xCBE@infosec.pub 2 points 1 year ago

nice! I didn’t know this plant. I’ll try to find some.

[-] 0xCBE@infosec.pub 8 points 1 year ago

I like basil. At some point I i got tired of killing all the plants and started learning how to properly grow and care greens with basil.

It has plenty of uses and it requires the right amount of care, not too simple not too complex.

I’ve grown it from seeds, cuttings, in pots, outside and in hydroponics.

[-] 0xCBE@infosec.pub 2 points 1 year ago

This is the official statement I think: https://global.toyota/jp/newsroom/corporate/39174380.html but it's light on details (I think, I google translated)

From reading around it looks like it was either a compute instance or a database exposed by mistake, nothing sophisticated.

[-] 0xCBE@infosec.pub 1 points 1 year ago

Maybe it's enough to make a pull request to the original CSS files here? I would guess the Lemmy devs would rather focus more on the backend right now

[-] 0xCBE@infosec.pub 3 points 1 year ago

I think access keys are a legacy authentication mechanism from a time where the objective was increasing cloud adoption and public clouds wanted to support customers to transition from on prem to cloud infra.

But for cloud native environments there are safer ways to authenticate.

A data point: for GCP now Google also advise new customers to enable from the start the org policy to disable service account key creation.

[-] 0xCBE@infosec.pub 1 points 1 year ago

great! Have you consider packing this up as a full theme for Lemmy?

[-] 0xCBE@infosec.pub 1 points 1 year ago

nice instance!

[-] 0xCBE@infosec.pub 4 points 1 year ago

ahah thank you, we shall all yell together then

view more: next ›

0xCBE

joined 1 year ago
MODERATOR OF