Forwarded from 🇺🇦 automation-remarks.com
This media is not supported in your browser
VIEW IN TELEGRAM
Onboarding experience as a new QA be like😁
😁4
👏3
DevTestSecOps
Photo
Very testing event - because of the air raid alert we went to test the bomb shelter 🤪
😱3😁2
#23andMe #hack
I was thinking of giving them my genetic information. 🤔
https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/
I was thinking of giving them my genetic information. 🤔
https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/
BleepingComputer
Genetics firm 23andMe says user data stolen in credential stuffing attack
23andMe has confirmed to BleepingComputer that it is aware of user data from its platform circulating on hacker forums and attributes the leak to a credential-stuffing attack.
😁1😱1
#testing
One of the most “high-profile” articles of the past month. It describes how #Microsoft got rid of #SDET engineers and what happened:
https://blog.pragmaticengineer.com/how-microsoft-does-qa/
One of the most “high-profile” articles of the past month. It describes how #Microsoft got rid of #SDET engineers and what happened:
https://blog.pragmaticengineer.com/how-microsoft-does-qa/
The Pragmatic Engineer
How Microsoft does Quality Assurance (QA)
The Redmond Big Tech giant pioneered the SDET role in the 90s. It then retired it in 2014. What happened and why?
👍3
A huge set of #mindmap on various #testing topics. The only downside is that they are all screenshots, so you need to rewrite them in xmind (or something similar):
https://github.com/dimensi0nless/software-testing-mindmaps
https://github.com/dimensi0nless/software-testing-mindmaps
GitHub
GitHub - dimensi0nless/software-testing-mindmaps
Contribute to dimensi0nless/software-testing-mindmaps development by creating an account on GitHub.
👍2
DevTestSecOps
#hack #Okta again!? https://sec.okta.com/harfiles
#hack #way
A good example of a suspected security breach report from !#1password
They suspected that something was going on in their #Okta account, i.e. all sorts of internal admin and helpdesk stuff.
A member of the IT team handled Okta support and, at their request, created a HAR file from Chrome Dev Tools and uploaded it to the Okta support portal. This HAR file contains a record of all traffic between the browser and Okta's servers, including sensitive information including session cookies. In the early morning hours of Friday, September 29, an unknown attacker used the same Okta session used to create the HAR file to access the Okta administration portal and attempted the following:
- Attempted to access an IT employee's user dashboard, but the attempt was blocked by the Okta system.
- Updated the existing IDP tied to our Google production environment.
- Activated the IDP.
- Requested an admin user report.
The last action on this list resulted in an alert email being sent to a member of the IT team, which of course resulted in a quick response.
More details:
https://blog.1password.com/files/okta-incident/okta-incident-report.pdf
A good example of a suspected security breach report from !#1password
They suspected that something was going on in their #Okta account, i.e. all sorts of internal admin and helpdesk stuff.
A member of the IT team handled Okta support and, at their request, created a HAR file from Chrome Dev Tools and uploaded it to the Okta support portal. This HAR file contains a record of all traffic between the browser and Okta's servers, including sensitive information including session cookies. In the early morning hours of Friday, September 29, an unknown attacker used the same Okta session used to create the HAR file to access the Okta administration portal and attempted the following:
- Attempted to access an IT employee's user dashboard, but the attempt was blocked by the Okta system.
- Updated the existing IDP tied to our Google production environment.
- Activated the IDP.
- Requested an admin user report.
The last action on this list resulted in an alert email being sent to a member of the IT team, which of course resulted in a quick response.
More details:
https://blog.1password.com/files/okta-incident/okta-incident-report.pdf
👏2🤔2
How to understand that it's time for you to move on from #testing, and what are the possible development paths after Senior and QA leads:
https://www.thequalityduck.co.uk/is-it-time-you-moved-on-from-quality-engineering/
https://www.thequalityduck.co.uk/is-it-time-you-moved-on-from-quality-engineering/
The Quality Duck - Engineering Leadership with a side of Quality Evangelism
Is It Time For You To Move On from Quality Engineering?
Feel like you've reached your career limit in Quality Engineering? You aren't alone! Read this blog for insights into options for what's next!
👍1🤔1