syd@lemy.lol to Technology@lemmy.worldEnglish · edit-210 months ago15,111,945 Trello account have been breachedlemy.lolimagemessage-square35fedilinkarrow-up10arrow-down10file-text
arrow-up10arrow-down1image15,111,945 Trello account have been breachedlemy.lolsyd@lemy.lol to Technology@lemmy.worldEnglish · edit-210 months agomessage-square35fedilinkfile-text
minus-square_dev_null@lemmy.zxcvn.xyzlinkfedilinkEnglisharrow-up0·10 months agoGet something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
minus-squaretsonfeir@lemm.eelinkfedilinkEnglisharrow-up0·10 months agoWith a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s
Nobody watches sever logs 😞
Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.
With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s