Reply

Hey thanks for letting me know! Shall I add a note to the post to say that depending in what you use, exec may be needed?

 Like

Liked Terence Eden (@Edent@mastodon.social)
Post details
A question for #infosec practitioners. I've found an abandoned AWS bucket from a very large company. It serves all the images & fonts in their billing emails. I defensively registered it to prevent an attacker from injecting malicious content into the emails I receive. Then I emailed their security.txt contact to inform them and offering to transfer it back (for free, obviously). Was that the right thing to do? Should I have waited for a response from them before securing the bucket?

 Like

Liked a post on Twitter
Post details

 Like

Liked a post on Twitter
Post details