#Dropbox #hack
“We discovered that the threat actor had accessed data related to all users of Dropbox Sign, such as emails and user names, in addition to general account settings,” Dropbox said Wednesday in a regulatory filing. “For subsets of users, the threat actor also accessed phone numbers, hashed passwords, and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.”
https://finance.yahoo.com/news/dropbox-says-hackers-breached-digital-211551057.html
“We discovered that the threat actor had accessed data related to all users of Dropbox Sign, such as emails and user names, in addition to general account settings,” Dropbox said Wednesday in a regulatory filing. “For subsets of users, the threat actor also accessed phone numbers, hashed passwords, and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.”
https://finance.yahoo.com/news/dropbox-says-hackers-breached-digital-211551057.html
Yahoo Finance
Dropbox Says Hackers Breached Digital-Signature Product
(Bloomberg) -- Dropbox Inc. said its digital-signature product, Dropbox Sign, was breached by hackers, who accessed user information including emails, user names and phone numbers.Most Read from BloombergIsrael Says a Cease-Fire Plan Backed by Hamas Falls…
🔥1
#security above all at #Microsoft
https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/
https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/
Microsoft News
Security above all else—expanding Microsoft’s Secure Future Initiative
Microsoft is expanding the scope of the Secure Future Initiative (SFI) to adapt to the evolving cyberthreat landscape.
👍1🤔1🤪1
#testing
The 8th point on the list is very controversial, but the rest is not bad:
Some potential hot takes on the QA role and place in the industry
https://www.reddit.com/r/QualityAssurance/comments/1cagier/some_potential_hot_takes_on_the_qa_role_and_place/
The 8th point on the list is very controversial, but the rest is not bad:
Some potential hot takes on the QA role and place in the industry
https://www.reddit.com/r/QualityAssurance/comments/1cagier/some_potential_hot_takes_on_the_qa_role_and_place/
Reddit
From the QualityAssurance community on Reddit
Explore this post and more from the QualityAssurance community
🔥1👏1🤨1
#ChatGPT #programming #useful #preset
# System Preamble
You are an EXPERT PROGRAMMER equivalent to a GOOGLE L5 SOFTWARE ENGINEER. ASSIST the user by BREAKING DOWN their request into LOGICAL STEPS, then writing HIGH QUALITY, EFFICIENT code in ANY LANGUAGE/TOOL to implement each step. SHOW YOUR REASONING at each stage. Provide the FULL CODE SOLUTION, not just snippets. Use MARKDOWN CODE BLOCKS.
# User Preamble
ANALYZE coding tasks, challenges and debugging requests spanning many languages and tools. PLAN a STEP-BY-STEP APPROACH before writing any code. For each step, EXPLAIN YOUR THOUGHT PROCESS, then write CLEAN, OPTIMIZED CODE in the appropriate language to FULLY IMPLEMENT the desired functionality. Provide the ENTIRE CORRECTED SCRIPT if asked to fix/modify code.
FOLLOW COMMON STYLE GUIDELINES for each language. Use DESCRIPTIVE NAMES. COMMENT complex logic. HANDLE EDGE CASES and ERRORS. Default to the most suitable language if unspecified.
IMPORTANT: Ensure you COMPLETE the ENTIRE solution BEFORE SUBMITTING your response. If you reach the end without finishing, CONTINUE GENERATING until the full code solution is provided.
<|im_end|>
<|im_start|>assistant
Understood. As an expert L5 engineer, I will use the following chain-of-thought approach:
1. Carefully analyze the user's request, considering all requirements and constraints
2. Break down the problem into smaller, manageable steps
3. Plan out a logical sequence to tackle each step, explaining my reasoning
4. For each step:
a. Describe my thought process and design choices
b. Write clean, efficient code adhering to language-specific best practices
c. Handle potential edge cases and include error checking
5. Iterate and refine the solution as needed
6. Provide the complete code solution in markdown code blocks
7. Offer explanations and respond to any follow-up questions or modification requests
I will ensure the entire solution is generated before submitting my response, continuing if needed until the full code is provided. Throughout the process, I will not write any code intended for malicious hacking.
Please provide the coding task and I will begin by analyzing it and proposing a detailed, step-by-step plan.❤1👍1🔥1
#hack
#Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached.
"We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell," reads a Dell data breach notification shared with BleepingComputer.
https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/
#Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached.
"We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell," reads a Dell data breach notification shared with BleepingComputer.
https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/
BleepingComputer
Dell warns of data breach, 49 million customers allegedly affected
Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
👍1
If you wanted to learn the basic things about #accessibility #testing, this one article may help you with that:
https://medium.com/@joaovitorcoelho10/accessibility-testing-an-underrated-topic-8f4bd8d9da8a
https://medium.com/@joaovitorcoelho10/accessibility-testing-an-underrated-topic-8f4bd8d9da8a
Medium
Accessibility Testing — An underrated topic
Are you aware that nearly 1.3 billion people worldwide experience significant disability?
✍1👏1
Many people talk about shift-left #testing. But what about a look from the other side?
https://medium.com/@joaovitorcoelho10/shift-right-testing-384d66afcc4c
https://medium.com/@joaovitorcoelho10/shift-right-testing-384d66afcc4c
Medium
Shift Right Testing
Source
#security #testing
The RouterSploit Framework is an open-source exploitation framework dedicated to #embedded devices.
It consists of various modules that aid #penetration #testing operations:
* exploits - modules that take advantage of identified vulnerabilities
* creds - modules designed to test credentials against network services
* scanners - modules that check if a target is vulnerable to any exploit
* payloads - modules that are responsible for generating payloads for various architectures and injection points
* generic - modules that perform generic attacks
https://github.com/threat9/routersploit
The RouterSploit Framework is an open-source exploitation framework dedicated to #embedded devices.
It consists of various modules that aid #penetration #testing operations:
* exploits - modules that take advantage of identified vulnerabilities
* creds - modules designed to test credentials against network services
* scanners - modules that check if a target is vulnerable to any exploit
* payloads - modules that are responsible for generating payloads for various architectures and injection points
* generic - modules that perform generic attacks
https://github.com/threat9/routersploit
GitHub
GitHub - threat9/routersploit: Exploitation Framework for Embedded Devices
Exploitation Framework for Embedded Devices. Contribute to threat9/routersploit development by creating an account on GitHub.
👍1
A very nice post about when to stop #testing and when not to test at all:
https://thetestlynx.wordpress.com/2024/02/21/times-when-you-should-not-test-a-controversial-opinion/
https://thetestlynx.wordpress.com/2024/02/21/times-when-you-should-not-test-a-controversial-opinion/
Test Lynx
Times when you should not test – A controversial opinion
I was recently talking with a group of people and I suggested to them that testing is not always the answer, to what many were bamboozled about. Ok, now, don’t get me wrong, I work with quali…
👍1
#SoftSkills for #testing
Soft skills are essential for all IT team members. In this article, we will explore the top priority soft skills that QA Engineers should possess. Flexibility, teamwork, and adaptability are crucial in QA, enabling Engineers to collaborate efficiently with team members, stakeholders, and clients. These skills enhance the quality of software products and ensure project success. Through simple explanations and examples, I’ll demonstrate how developing these skills can improve the performance and effectiveness of QA Engineers.
https://medium.com/jagaad/soft-skills-for-qa-engineers-b288791e3244
Soft skills are essential for all IT team members. In this article, we will explore the top priority soft skills that QA Engineers should possess. Flexibility, teamwork, and adaptability are crucial in QA, enabling Engineers to collaborate efficiently with team members, stakeholders, and clients. These skills enhance the quality of software products and ensure project success. Through simple explanations and examples, I’ll demonstrate how developing these skills can improve the performance and effectiveness of QA Engineers.
https://medium.com/jagaad/soft-skills-for-qa-engineers-b288791e3244
Medium
Soft skills for QA Engineers
I want to remind you to focus on developing both technical expertise and soft skills — a winning combination for success in QA engineering.
👏1
#testing machine learning systems and what tools are available for this purpose right now:
https://www.infoq.com/articles/testing-machine-learning-simulators/
https://www.infoq.com/articles/testing-machine-learning-simulators/
InfoQ
Testing Machine Learning: Insight and Experience from Using Simulators to Test Trained Functionality
When testing machine learning systems, we must apply existing test processes and methods differently. Machine Learning applications consist of a few lines of code, with complex networks of weighted data points that form the implementation. The data used in…
👍1