Cyber Research #69Mert Coskuner·Follow2 min read·Feb 4, 2023--ListenSharePhoto by Timothy Eberly on UnsplashArticlesAWS Service Control PoliciesGovernance: Setting security controls at the organizational levelmedium.comSecurity Drone: scaling continuous security at Revolut.In this article, we’d like to share with you our approach to provide the highest security assurance in fast CI/CD…medium.comHiding In PlainSight - Indirect Syscall is Dead! Long Live Custom Call StacksPosted on 29 Jan 2023 by Paranoid Ninja NOTE: This is a PART II blog on Stack Tracing evasion. PART I can be found…0xdarkvortex.devIntegrating threat modeling with DevOps - Security documentationThis post is authored by Simone Curzi, Anthony Nevico, Jonathan Davis, Rafael Pazos Rodriguez, and Ben Hanson Threat…learn.microsoft.comToolsGitHub - threathunters-io/laurel: Transform Linux Audit logs for SIEM usageLAUREL is an event post-processing plugin for auditd(8) that generates useful, enriched JSON-based audit logs suitable…github.comGitHub - Squiblydoo/debloat: A GUI tool for removing bloat from executablesDebloat is a GUI tool to remove excess garbage from bloated executables. By excess garbage, I mean 300 - 800MB of junk…github.comGitHub - lightspin-tech/eks-creation-engine: The Amazon Elastic Kubernetes Service (EKS) Creation…The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the…github.comGitHub - GoogleCloudPlatform/security-response-automation: Take automated actions against threats…Take automated actions on your Security Command Center findings: Automatically create disk snapshots to enable forensic…github.comGitHub - iriusrisk/OpenThreatModel: OpenThreatModelThe Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system. OTM…github.com