Skip to main content

Questions tagged [security]

For questions relating to application security and attacks against software. Please don't use this tag alone, that results in ambiguity. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. If your question is not about a specific programming problem, please consider instead asking it at Information Security SE

0 votes
0 answers
26 views

I’m currently preparing for the CISSP and focusing on key security areas like access control, network security, risk management, and security operations using official study resources. To strengthen ...
Russell Walker's user avatar
3 votes
1 answer
247 views

Is there anyway to find from the logs if a user is added to ediscovery Manager or ediscovery admin role group? KQL or splunk query would be helpful. I suppose for the query the Workload would be ...
mighty's user avatar
  • 69
0 votes
2 answers
152 views

I sort of frequently encounter software that pretends it owns all of a PostgreSQL instance and wants to create a database, even if it's already there and the software uses the account owning the ...
tmlpy's user avatar
  • 11
4 votes
2 answers
1k views

My DigitalOcean droplets are compromised and used for DDoS attacks. This is the third occurrence. Each time I destroy the droplet, start from scratch, add more security, and within a day it occurs ...
Nathi Krithin's user avatar
0 votes
0 answers
396 views

We're starting to see a problem where ssh tunneling stops working in MacOS Sequoia and/or Tahoe. The problem stems from MacOS adding "Local Network Access" permissions, which prevent ...
thomasafine's user avatar
0 votes
2 answers
188 views

I have ~50 requests per second coming from Singapore (many different ip starting by 47.79) on a reverse proxy VM. Apache is automatically killed because it exhaust the memory resource... I am trying ...
ppr's user avatar
  • 103
0 votes
1 answer
67 views

A few people can access my Azure subscription via https://portal.azure.com. How can I configure Azure so that I get an email alert when someone accesses/views keys in my Azure subscription? My Azure ...
Franck Dernoncourt's user avatar
2 votes
1 answer
195 views

I want to bulk-rotate/renew all the keys of all my resources in my Azure subscription. How can I achieve that? My Azure subscription only contain Azure Cognitive Resources if that matters. I don't ...
Franck Dernoncourt's user avatar
2 votes
0 answers
97 views

I am looking for a hypervisor to run several non-interacting VMs (or containers, see the section on Kata Containers at the end of this question) under, with the host being a laptop running secureblue (...
user1326024's user avatar
0 votes
1 answer
144 views

I am looking for a way to temporarily disable or stop an Azure Cognitive Services resource to ensure no further requests are processed and to halt consumption-based billing. How can one disable/pause ...
Franck Dernoncourt's user avatar
2 votes
1 answer
244 views

I am setting up an Azure OpenAI resource and I need to restrict access so that only requests from our office static IPs and our application server are allowed. By default, the resource seems to be ...
Franck Dernoncourt's user avatar
0 votes
1 answer
193 views

I recently used a remote CLI to authenticate with Google Cloud Platform (GCP) using the following command: gcloud auth application-default login --no-launch-browser I no longer have access to that ...
Franck Dernoncourt's user avatar
0 votes
1 answer
169 views

I submitted my domain for HSTS preload (with include_domains=on) back in a few months. After that, I realised that some old websites in the subdomains were not fully supported in HTTPS. I later ...
sc1013's user avatar
  • 113
-2 votes
1 answer
100 views

Environment Host: Arch Linux (Mini PC) Docker: Standard Bridge Network Networking: Tailscale (Host level) + Caddy (Containerized) Question See the context below to better understand my question! I ...
Trinket's user avatar
0 votes
1 answer
134 views

In an Ansible based email server automation project, random passwords are created for domain admins and users mailboxes, and stored in a JSON file. In addition to using them in the automation process, ...
Manohara's user avatar

15 30 50 per page
1
2 3 4 5
465