Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Navigating Rough Waters: A Guide to Business Continuity Plans
Navigating Rough Waters: A Guide to Business Continuity Plans
In the unpredictable sea of business, storms can emerge unexpectedly. Just like sailing in a boat, where unforeseen challenges threaten to…
Bytesofinfosec
Jun 9
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
Enhancing Email Security: Detonation of Attachments and Safe Attachments in Office 365 ATP
Enhancing Email Security: Detonation of Attachments and Safe Attachments in Office 365 ATP
In the realm of cybersecurity, protecting digital environments from malicious threats is a top priority. One key technique that plays a…
Bytesofinfosec
Jun 3
Simplifying Threat Detection with SIGMA: An Open-Source Solution
Simplifying Threat Detection with SIGMA: An Open-Source Solution
In today’s rapidly evolving cyber threat landscape, organisations are constantly seeking innovative ways to enhance their security posture…
Stefan Bargan
Jun 3
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
In an increasingly digital world, understanding digital forensics is essential for solving crimes and protecting information. This blog…
Stefan Bargan
May 31
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
In the vast digital ocean, where organizations sail through the complexities of the cyber world, a storm can hit at any moment. This storm…
Bytesofinfosec
May 29
Trending Stories
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain M Abidi
May 19
Free Resources for Blue Teamers
Free Resources for Blue Teamers
Free courses to start your path in blue teaming.
Maisam Noyan
May 18
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
In the interconnected landscape of the digital era, safeguarding sensitive information goes beyond securing your own walls; it extends to…
Bytesofinfosec
May 22
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
When we think of the internet, we usually picture the websites we visit every day — social media, news, online shopping. However, there’s…
Stefan Bargan
May 25
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
In the rapidly evolving landscape of cybercrime, it’s essential for those of us pursuing an education in the field to have hands-on…
Stefan Bargan
Mar 28
Phishing Email Analysis: A Comprehensive Guide
Phishing Email Analysis: A Comprehensive Guide
Yesterday I was going through my spam emails and I saw an email that caught my interest. Today, I want to share my experience of analysing…
Stefan Bargan
Mar 31
Blue Team Labs Online — The Report Write-Up [No Answers]
Blue Team Labs Online — The Report Write-Up [No Answers]
The Report Scenario — You are working in a newly established SOC where still there is lot of work to do to make it a fully functional one…
Stefan Bargan
Feb 3
OSINT Analysis of a Real Fraudulent Email
OSINT Analysis of a Real Fraudulent Email
In an era where digital communication has become a cornerstone of our daily lives, email stands out as a prime channel for both legitimate…
Golden Owl
Feb 12
How Facebook Intercepts Your Web Traffic
How Facebook Intercepts Your Web Traffic
The Sinister Truth Behind Facebook’s Data Interception
Denise Banks
Apr 3
CONTROL ANIMALS BY USING FLIPPER ZERO
CONTROL ANIMALS BY USING FLIPPER ZERO
In this article, we will discuss how to use Flipper Zero to control Dogs and Bats.
Syed Zain M Abidi
Mar 15
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
E-commerce has revolutionized the way we shop, offering convenience, variety, and often better prices. However, it has also opened new…
Golden Owl
Apr 8
How to Hack Wi-Fi Passwords in 2023 — WiFi Pentesting
How to Hack Wi-Fi Passwords in 2023 — WiFi Pentesting
Did you know that 🫵your Wi-Fi network is easily hackable? In this blog post, I will teach you how you can assess and hack your Wi-Fi…
Maisam Noyan
Sep 28, 2023
How to Host a Website on the Dark Web
How to Host a Website on the Dark Web
In this article, I will show you how to set up a server that will host a website on the Dark Web.
Frost
Nov 15, 2023
Malware Reverse Engineering CTFs
Malware Reverse Engineering CTFs
Nourhanelyamany
Nov 3, 2023
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
In today’s world, cybercrime has become a familiar term that impacts us all. From stealing personal information to hacking government…
Stefan Bargan
May 23
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
Hack Cars Like Teslas, Using Flipper Zero.
Hack Cars Like Teslas, Using Flipper Zero.
Using the Key Fobs Replay Attacks.
Syed Zain M Abidi
Dec 28, 2023
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
How to Crack ZIP & RAR Files with Zydra
How to Crack ZIP & RAR Files with Zydra
Frost
Nov 18, 2023
Creating a TryHackMe Room
Creating a TryHackMe Room
Hello everyone! I’m thrilled to be back on Medium after a brief hiatus. I have some exciting updates to share with you all:
Stefan Bargan
May 14
Discover NIST’s Four New Free Online Courses on Risk Management
Today, I have some exciting news for those of you interested in cybersecurity and risk management. The National Institute of Standards and…
Stefan Bargan
Apr 13
Submission Guidelines — CyberScribers
Submission Guidelines — CyberScribers
Welcome to CyberScribers! CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital…
Stefan Bargan
Dec 19, 2023
Easily Reveal Hidden Passwords in any Browser
Easily Reveal Hidden Passwords in any Browser
Browsers offer the capability of remembering usernames and passwords. Most of us use this feature to automatically save our passwords to…
Frost
Feb 10
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams