"idle services", often referred to as "orphaned" or "zombie" infrastructure, is also runs the serious risk of misconfiguration. If you aren't aware of a cloud resource you have running, you're not patching it and you're not scanning it for misconfiguration. Quite a few cloud-based breaches begin when a bad actor exploits a vulnerability in an orphaned cloud resource, which gives them access to the environment (and often discoverability with regards to what else is in the environment).
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
"idle services", often referred to as "orphaned" or "zombie" infrastructure, is also runs the serious risk of misconfiguration. If you aren't aware of a cloud resource you have running, you're not patching it and you're not scanning it for misconfiguration. Quite a few cloud-based breaches begin when a bad actor exploits a vulnerability in an orphaned cloud resource, which gives them access to the environment (and often discoverability with regards to what else is in the environment).