ContentPosts from @dawnalvarez494..
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

What happens when you leak AWS credentials and how AWS minimizes the damage

AWS scans public GitHub repositories for leaked AWS credentials and alerts the user. The author intentionally leaked AWS credentials to a public GitHub repository to see what would happen. - AWS quickly added the "AWSCompromisedKeyQuarantineV2" policy to the IAM user account and informed the user vi.. read more  

What happens when you leak AWS credentials and how AWS minimizes the damage
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

Denial-of-Service Attacks In DeFi: The Balancer-Synthetix Case

In this article, a vulnerability in a DeFi project's liquidity pool is explored, caused by a denial-of-service attack vector that affects internal token balances. - The vulnerability arises when a Balancer multi-token flash loan is taken out for tokens with double entry points. - The article covers .. read more  

Denial-of-Service Attacks In DeFi: The Balancer-Synthetix Case
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

Reverse engineering the Facebook Messenger API

The author wrotes a blog post on how they reverse-engineered the Facebook Messenger API and turned it into a tutorial for others to follow. - The blog post warns against using reverse engineering for irresponsible behavior and provides examples of such behavior. - The post details a step-by-step gui.. read more  

Reverse engineering the Facebook Messenger API
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

SSH Security: Protecting Your Linux Server from Threats

This blog post discusses various methods to restrict SSH access to a Linux server by IP address for enhanced security, including modifying the sshd_config file, using TCP wrappers, and implementing firewall rules. The post also covers additional SSH security hardening best practices such as using a.. read more  

SSH Security: Protecting Your Linux Server from Threats
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

Unexpected charges on your AWS bill

This blog post discusses the most common unexpected charges on AWS bills that can significantly increase the overall cost of using AWS services. - The author provides tips on how to avoid these charges, such as using AWS Auto Scaling, Reserved Instances or Savings Plans, and monitoring data transfer.. read more  

Unexpected charges on your AWS bill
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

The Hows and Whys of Effective Production-Readiness Reviews

Nora Jones, CEO & Founder ofJeli, talks about building Production Readiness Review (PRR) process & how its emphasis on context and psychological safety promotes proactive behavior. Jones presents tangible ways to start building a PRR process that fits your organization's unique context while educat.. read more  

The Hows and Whys of Effective Production-Readiness Reviews
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

Driving a customer-focused incident response process

In the midst of a crisis, external communication with customers can easily fall down the list of priorities for a company. However, it is crucial to prioritize communication during these times to build trust and strengthen relationships with customers. Atlassian's recent outage serves as an example.. read more  

Driving a customer-focused incident response process
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

A guide to cyber threat hunting with Promtail, Grafana Loki, Sigma, and Grafana Cloud

The Security Operations team at Grafana Labs has developed apySigmaGrafana Loki backend that can help security teams identify suspicious or malicious activity in log files. They use theSigma project, which is a generic structured format for sharing methods for identifying such activity in log files... read more  

A guide to cyber threat hunting with Promtail, Grafana Loki, Sigma, and Grafana Cloud
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

How We Improved Our Monitoring Stack With Only a Few Small Changes

The article discusses the process of improving the monitoring system at Riskified. The team identified pain points and goals, including bottleneck on changes in the monorepo, crashing Prometheus, inability to silence alerts easily, and removing hardcoded secrets in Alertmanager config. They consid.. read more  

How We Improved Our Monitoring Stack With Only a Few Small Changes
Link
@faun shared a link, 2 years, 11 months ago
FAUN.dev()

How we reduced our Prometheus infrastructure footprint by a third

This article discusses sharding in Prometheus, a technique used to distribute the load of collecting metrics across multiple instances. The article describes a problem where the number of metrics being scraped was growing non-linearly, causing increased memory and CPU costs. The root cause was iden.. read more  

How we reduced our Prometheus infrastructure footprint by a third