This is not a far fetch scenario; this actually happens to many cloud users; Experienced and newcomers.
Here are some Pro Tips for you for using ...
For further actions, you may consider blocking this person and/or reporting abuse
Wow this problems always some people use to trick others... Hmmm l am here for that problems... Here go there are Top.10 most hackers use most ...
1,,injection.
2..Broken access control
3..
Bet l will teach you how to beat up quality...
Thanks for sharing! Would you recommend doing the course even if not using Azure or is it completely designed for Azure?
Hi Jasterix! The course goes over basic concepts of cloud security like various types of encryption, shared responsibility, identity and access, what is a DDoS attack, firewall and more. All of them are relevant to all clouds and private data centers. The examples used are on Azure cloud.
thank you! I'm excited to start
Thanks Adi! I'm always looking for tips on security best practices. :)
thanks, AmberJ!
a known attack vector is redis, when redis is accessible by external incoming requests is possible to store open ssl keys and store that in .ssh/ then the attacker will have full server access
Not sure how it related to Redis? Redis is in-memory database. can you elaborate more?