Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
The ChatGPT Equivalent for Cybersecurity: Uncensored, Unstoppable, & unfiltered
The ChatGPT Equivalent for Cybersecurity: Uncensored, Unstoppable, & unfiltered
I’ve found a new tool that I think everyone in the cybersecurity industry is going to be amazed by! The #1 uncensored, open source AI model…
Ilah Johnson
Sep 28
Quantum-Resistant Cryptography: Understanding the Future of Secure Communication with Mathematical
Quantum-Resistant Cryptography: Understanding the Future of Secure Communication with Mathematical
Introduction:
GhostByte
Sep 28
Nikto: Web Server Security Scanner
Nikto: Web Server Security Scanner
1. Introduction to Nikto
JJ Gallego
Sep 25
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Well, well! After the boom-bastic article on the Identification step in our bug bounty and penetration testing series on real Goverment…
Shaikh Minhaz
Sep 18
Nuclei, a vulnerability scanner and OWASP Juice Shop
Nuclei, a vulnerability scanner and OWASP Juice Shop
What is Nuclei?
JJ Gallego
Sep 15
Living with Trust Issues: The Human Side of Zero Trust Architecture
Living with Trust Issues: The Human Side of Zero Trust Architecture
A Story Unfolding Across Timelines.
Liat Portal
Sep 14
Dread Unveiled: Navigating the Dark Web’s Reddit-like forum
Dread Unveiled: Navigating the Dark Web’s Reddit-like forum
Dread is a dark web forum that serves as a platform for users to discuss various topics, primarily focusing on darknet marketplaces and…
Stefan Bargan
Sep 14
Trending Stories
Technique Inference Engine, Top 10 Ransomware Calculator and Stop Ransomware Advisory CISA
Technique Inference Engine, Top 10 Ransomware Calculator and Stop Ransomware Advisory CISA
Rapid Incident Response with the help of prioritization — another great tool developed by the CTID Mitre Engenuity
SIMKRA
Sep 10
Special Forces Unit 29155 — Assassination attempts, election manipulation, terrorist attacks…
Special Forces Unit 29155 — Assassination attempts, election manipulation, terrorist attacks…
Probably the most dangerous military cyber actor in the world
SIMKRA
Sep 7
OSINT for nicknames (Tookie-osint)
OSINT for nicknames (Tookie-osint)
Tookie-osint offers an intuitive and user-friendly interface designed for simplicity and effectiveness. This tool helps users uncover…
JJ Gallego
Sep 11
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
New Instagram Crypto Scam That’s Too Good to Be True
New Instagram Crypto Scam That’s Too Good to Be True
A couple of days ago, I received a message request on Instagram that caught my attention — and I’m not ashamed to admit it was the…
Stefan Bargan
Aug 3
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5
Cloud Computers for Hacking
Cloud Computers for Hacking
Cloud computing has been around for a while now. There are offerings from many big tech companies and it's very cheap, sometimes free, to…
m5kro
Nov 12, 2023
How to use Bettercap
How to use Bettercap
Bettercap, the successor to Ettercap, is known as the Swiss Army knife for network hacking. It comes with various tools and modules to…
m5kro
Dec 25, 2022
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
Unraveling the Web: A Deep Dive into a Web Framework Compromise
Unraveling the Web: A Deep Dive into a Web Framework Compromise
In the fast-paced world of cybersecurity, even the most fortified web portals can succumb to the ingenuity of cybercriminals. This article…
Bytesofinfosec
Sep 4
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
Unveiling the Anatomy of a Cloud Environment Compromise
Unveiling the Anatomy of a Cloud Environment Compromise
In the digital age, the cloud has revolutionized the way organizations store and manage their data. However, with great convenience comes…
Bytesofinfosec
Sep 7
OSINT Techniques for Identifying and Exposing Online Anonymity
OSINT Techniques for Identifying and Exposing Online Anonymity
OSINT Techniques for Identifying and Exposing Online Anonymity
Golden Owl
Oct 18, 2023
Submission Guidelines — CyberScribers
Submission Guidelines — CyberScribers
Welcome to CyberScribers! CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital…
Stefan Bargan
Dec 19, 2023
Cool Tools: Making Your Cyber Security Journey Fun.
Cool Tools: Making Your Cyber Security Journey Fun.
Investigator515 explores some outside the box tools for learning about security and physical access control.
Investigator515
Nov 7, 2023
Free Resources for Blue Teamers
Free Resources for Blue Teamers
Free courses to start your path in blue teaming.
Maisam Noyan
May 18
My Honest Experience: Malcore vs. VirusTotal
My Honest Experience: Malcore vs. VirusTotal
For years, I was a loyal user of VirusTotal. It was my go-to tool for scanning files and URLs for potential threats. It was reliable…
Stefan Bargan
Jul 6
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
Cloning Hotel Keycards with Android
Cloning Hotel Keycards with Android
Most Hotels use NFC keycards. NFC stands for near field communication. It is used in a wide variety of products, from tags to keycards…
m5kro
Nov 17, 2022
Navigating the Waters of Information Technology Disaster Recovery Testing
Navigating the Waters of Information Technology Disaster Recovery Testing
In the realm of Information Security, safeguarding against unforeseen disasters is paramount. As an Information Security Professional based…
Bytesofinfosec
Aug 14
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
In the realm of cybersecurity, two significant challenges that organizations face are accidental data disclosure and malware threats. In…
Bytesofinfosec
Aug 2
Frieren: Open Source WiFi Pineapple Alternative
Frieren: Open Source WiFi Pineapple Alternative
If you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…
m5kro
Jun 12
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Introduction: In the dynamic realm of cybersecurity, the role of threat intelligence cannot be overstated. It serves as a beacon of…
Bytesofinfosec
Feb 10
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams