Member-only storyCyber Research #56Mert Coskuner·Follow2 min read·Oct 8, 2022--SharePhoto by Ricardo Gomez Angel on UnsplashArticlesSecuring Developer Tools: A New Supply Chain Attack on PHPSonar discovered and responsibly disclosed a critical vulnerability in Packagist, a central component of the PHP supply…blog.sonarsource.commr.d0xIn this blog post I show how Chromium's application mode allows us to easily create realistic desktop phishing…mrd0x.com26 AWS Security Best Practices to Adopt in Production - SysdigOne of the most important pillars of a well-architected framework is security. Thus, it is important to follow these…sysdig.comBest practices on rolling out code scanning at enterprise scale | The GitHub BlogLearn how you can seamlessly define trusted custom secret patterns to detect secrets unique to your organization with…github.blogHow Palantir Manages Continuous Vulnerability Scanning at ScaleStaying on top of vulnerabilities and quickly remediating them is critical to staying ahead of our adversaries.blog.palantir.comOur Application Security Journey (Part 1)This is the first in a series of articles on the state of Application Security at Wise, describing the integration of…medium.comWhat's Inside Of a Distroless Container Image: Taking a Deeper LookGoogleContainerTools' distroless base images are often mentioned as one of the ways to produce small(er), fast(er), and…iximiuz.comHow DoorDash Ensures Velocity and Reliability through Policy Automation - DoorDash Engineering BlogLin Du Juvenal Santos Infrastructure-as-code is growing in popularity because it automates and streamlines the…doordash.engineeringHow to automatically build forensic kernel modules for Amazon Linux EC2 instances | Amazon Web…In this blog post, we will walk you through the EC2 forensic module factory solution to deploy automation to build…aws.amazon.com
Mert CoskunerOSCP YolculuğuMerhaba, bugünkü yazımda Offensive Security Certified Professional (OSCP) eğitimi, sertifikasyon süreci ve bu yoldaki maceramdan…·4 min read·Apr 4, 2018--3
Mert CoskunerinTrendyol TechModern Honey Network ile Honeypot Kurulumu — Part 1Merhaba, Trendyol Security ekibi olarak bu yazımızda honeypotlardan ve honeypot kullanarak sistemlerin nasıl korunabileceği konusundan…·6 min read·Mar 6, 2020--
Mert CoskunerinTrendyol TechIPS, IDS — Nedir?Merhaba, bu hafta IPS (Intrusion Prevention System) ve IDS (Intrusion Detection System) sistemlerinden bahseceğiz.·3 min read·Jan 13, 2020--
Mert CoskunerCyber Research #71Weekly list of cybersecurity-related articles and tools·2 min read·Feb 18--
exploit_dailyBLACK FRIDAY & Cyber Monday deals for Cybersecurity ProfessionalsGear up for Black Friday steals! Take advantage of these incredible opportunities. 6 min read·6 days ago--2
Alexis LingadCyber Security Certifications are USELESS if You Don’t Do These Things…Credits to https://pauljerimy.com/security-certification-roadmap/5 min read·Oct 31--3
Investigator515Cool Tools: Making Your Cyber Security Journey Fun.Investigator515 explores some outside the box tools for learning about security and physical access control.·5 min read·Nov 7--
TechjournalistHow to verify leak data?As a journalist or researcher, you may be handed leak data. But how to be sure it's the real deal? This is a leak data verification…19 min read·Nov 20--1