Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Safeguarding Information: A Comprehensive Guide to Information Classification and Handling
Safeguarding Information: A Comprehensive Guide to Information Classification and Handling
In the intricate landscape of cybersecurity, comprehending both information classification and handling is paramount for ensuring the…
Bytesofinfosec
Jul 12
Navigating Information Security: Unveiling the Essentials of Business Impact Assessment
Navigating Information Security: Unveiling the Essentials of Business Impact Assessment
Introduction As businesses traverse the digital landscape, the importance of safeguarding operations against potential disruptions becomes…
Bytesofinfosec
Jul 9
My Honest Experience: Malcore vs. VirusTotal
My Honest Experience: Malcore vs. VirusTotal
For years, I was a loyal user of VirusTotal. It was my go-to tool for scanning files and URLs for potential threats. It was reliable…
Stefan Bargan
Jul 6
Navigating the Cybersecurity Landscape: A Guide to Critical Business Service Mapping
Navigating the Cybersecurity Landscape: A Guide to Critical Business Service Mapping
Introduction
Bytesofinfosec
Jul 3
Navigating the Digital Storm: Understanding IT Disaster Recovery Plans
Navigating the Digital Storm: Understanding IT Disaster Recovery Plans
In the fast-paced world of technology, where businesses rely heavily on digital systems and data, the importance of having a robust IT…
Bytesofinfosec
Jun 24
Mastering Regular Expressions for Forensic Investigations
Mastering Regular Expressions for Forensic Investigations
Regular expressions, or “regex” for short, are powerful tools that enable investigators to search for specific patterns within text data…
Stefan Bargan
Jun 16
Safeguarding Your Digital Realm: A Comprehensive Guide to Cybersecurity ‘Vulnerability Scanning’
Safeguarding Your Digital Realm: A Comprehensive Guide to Cybersecurity ‘Vulnerability Scanning’
In the vast landscape of Information Security, understanding key concepts like “Vulnerability Scanning” is crucial. This guide aims to…
Bytesofinfosec
Jun 15
Trending Stories
Frieren: Open Source WiFi Pineapple Alternative
Frieren: Open Source WiFi Pineapple Alternative
If you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…
m5kro
Jun 12
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
How to Host a Website on the Dark Web
How to Host a Website on the Dark Web
In this article, I will show you how to set up a server that will host a website on the Dark Web.
Frost
Nov 15, 2023
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
CONTROL ANIMALS BY USING FLIPPER ZERO
CONTROL ANIMALS BY USING FLIPPER ZERO
In this article, we will discuss how to use Flipper Zero to control Dogs and Bats.
Syed Zain Abidi
Mar 15
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
E-commerce has revolutionized the way we shop, offering convenience, variety, and often better prices. However, it has also opened new…
Golden Owl
Apr 8
Is That Job Offer Real? Use OSINT to Find Out
Is That Job Offer Real? Use OSINT to Find Out
The internet has opened up a world of opportunities for job seekers, making it easier than ever to find and apply for jobs. However, it has…
Golden Owl
Jun 11
Security Blue Team: Introduction to Vulnerability Management Course Review
Security Blue Team: Introduction to Vulnerability Management Course Review
I recently completed the “Introduction to Vulnerability Management” course offered by SBT, and I must say it was a comprehensive and…
Denise Banks
Jan 23
Simplifying Threat Detection with SIGMA: An Open-Source Solution
Simplifying Threat Detection with SIGMA: An Open-Source Solution
In today’s rapidly evolving cyber threat landscape, organisations are constantly seeking innovative ways to enhance their security posture…
Stefan Bargan
Jun 3
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
When we think of the internet, we usually picture the websites we visit every day — social media, news, online shopping. However, there’s…
Stefan Bargan
May 25
Discover NIST’s Four New Free Online Courses on Risk Management
Today, I have some exciting news for those of you interested in cybersecurity and risk management. The National Institute of Standards and…
Stefan Bargan
Apr 13
Easily Reveal Hidden Passwords in any Browser
Easily Reveal Hidden Passwords in any Browser
Browsers offer the capability of remembering usernames and passwords. Most of us use this feature to automatically save our passwords to…
Frost
Feb 10
Using Burp Suite to Analyze POST Data
Using Burp Suite to Analyze POST Data
Burp Suite is a set of advanced tools used to analyze websites. From scanners to fuzzers Burp has it all. In this article, we’ll review the…
m5kro
Mar 22
Hashcat vs John the Ripper (JTR)
Hashcat vs John the Ripper (JTR)
Hashcat and John the Ripper are both popular tools for password cracking. Both have pros and cons, and in this article, we will review some…
m5kro
Feb 12, 2023
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Introduction: In the dynamic realm of cybersecurity, the role of threat intelligence cannot be overstated. It serves as a beacon of…
Bytesofinfosec
Feb 10
Cloud Computers for Hacking
Cloud Computers for Hacking
Cloud computing has been around for a while now. There are offerings from many big tech companies and it's very cheap, sometimes free, to…
m5kro
Nov 12, 2023
Code Inspection Unveiled: Static and Dynamic Analysis in Information Security
Code Inspection Unveiled: Static and Dynamic Analysis in Information Security
Code inspection is a fundamental practice in software development, especially in the dynamic and ever-evolving field of Information…
Bytesofinfosec
Mar 5
Safeguarding Your Digital Kingdom: Understanding Cloud Access Security Brokers (CASBs)
Safeguarding Your Digital Kingdom: Understanding Cloud Access Security Brokers (CASBs)
In the vast landscape of the digital world, where cloud services reign supreme, it’s crucial for organizations to fortify their defenses…
Bytesofinfosec
Feb 22
Study Warns of Cyber Professionals Transitioning to Criminal Activity
Study Warns of Cyber Professionals Transitioning to Criminal Activity
The Disturbing Trend of Cyber Professionals Embracing Criminality
Denise Banks
Mar 15
Safeguarding Networks: The Power of Redundancy Against DDoS Attacks
Safeguarding Networks: The Power of Redundancy Against DDoS Attacks
Introduction: In the dynamic landscape of Information Security, safeguarding networks against threats is paramount. One of the key…
Bytesofinfosec
Jan 23
Free Hands-On Ethical Hacking Course
Free Hands-On Ethical Hacking Course
Learn Penetration Testing for FREE
Maisam Noyan
Dec 1, 2023
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams