syd@lemy.lol to Technology@lemmy.worldEnglish · edit-210 months ago15M Trello accounts have been leakedlemy.lolimagemessage-square102fedilinkarrow-up1611arrow-down114file-textcross-posted to: securitynews@infosec.pub
arrow-up1597arrow-down1image15M Trello accounts have been leakedlemy.lolsyd@lemy.lol to Technology@lemmy.worldEnglish · edit-210 months agomessage-square102fedilinkfile-textcross-posted to: securitynews@infosec.pub
minus-square_dev_null@lemmy.zxcvn.xyzlinkfedilinkEnglisharrow-up3·10 months agoGet something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
minus-squaretsonfeir@lemm.eelinkfedilinkEnglisharrow-up2·10 months agoWith a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s
Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s