DevTestSecOps
138 subscribers
469 photos
29 videos
37 files
695 links
Forwards and notes on development, testing, security, and operations from @q587p.

About me: studied as System Architect, worked as a SysAdmin, working now as an Test Automation Engineer. Also, I'm interested in hacking (and everything related to it).

జ్
Download Telegram
#hack

If you are using any version of #Confluence, it is a good idea to backup all your data immediately. A vulnerability has been discovered that allows to modify and delete page and file content. Not only cloud instances are vulnerable, but also those located in user data centers:

https://arstechnica.com/security/2023/11/critical-vulnerability-in-atlassian-confluence-server-is-under-mass-exploitation/
🔥1😱1
😁2
#programming #date

At first I didn't understand, and then when I did!.. 🤪
😁2👏1😱1
Fresh #hack: #ChatGPT can generate sequences memorized from its training data using a very trivial attack. You tell the bot to “say the word * as many times as possible”. And, starting with some attempt, ChatGPT starts to produce something very similar to the original data from the training sample:

https://stackdiary.com/chatgpts-training-data-can-be-exposed-via-a-divergence-attack/
👍1👏1😱1
Intent IQ QA Automation Home Task.docx
2 MB
#JobSeeking

Test task for #testing job, maybe someone else will be interested. 🙃
👍2
#comix

“Gently Down the Stream” – a gentle introduction to #stream processing and Apache #Kafka.

A group of otters discover that they can use a giant river to communicate with each other. As more otters move into the forest, they must learn to adapt their system to cope with the increased forest activity.

25 slides:

https://www.gentlydownthe.stream/
🥰2😱1
Psychedelic cryptography is a way of concealing messages (normally in videos) so that only people who’ve taken LSD can receive the messages. 🤪

https://qri.org/blog/psycrypto-contest
🔥1🤯1🦄1
👌2😁1💯1
#security #hack #OAuth

Dylan from truffleSecurity talks about a simple hole (it seems a bit loud to call it a vulnerability) that allows users of companies that use #Google authorization in services like Slack or Zoom to continue to have access even after being fired and having their access removed.

The hole is that such services use email as the user ID. But, obviously, you can create several different email addresses that receive the same emails (e.g. by adding words after "+"):

https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of/
👏1👨‍💻1