Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Classification of IoT Vulnerabilities and Attack Types
Classification of IoT Vulnerabilities and Attack Types
Free Article
Asad Mohsin
Oct 27
Signs of Spyware Infection:
Free Article
Asad Mohsin
Oct 23
Top 10 Security Awareness Drawbacks in 2024 (And Why It’s Still a Struggle!)
Top 10 Security Awareness Drawbacks in 2024 (And Why It’s Still a Struggle!)
1. One Size Doesn’t Fit All
K.A.Malikoo
Oct 21
Hire a Hacker “Dark Web Reality!
Hire a Hacker “Dark Web Reality!
How to Hire a Hacker?
Tahir Ayoub
Oct 12
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
Diving into the world of cybersecurity can feel daunting at first, but thankfully, there are plenty of online resources to guide you every…
Stefan Bargan
Oct 11
Hacking Documentaries and Movies for Bug Bounty Hunters
Hacking Documentaries and Movies for Bug Bounty Hunters
Today, I will show some hacking documentaries and movies that are quite old but powerful enough to shape your entire career. Some are…
Tahir Ayoub
Oct 11
Signs That Indicate Your Mobile Phone Might Be Hacked
Signs That Indicate Your Mobile Phone Might Be Hacked
Friends, in today’s write-up we will be talking about the signs that indicate your mobile phone might be hacked.
Tahir Ayoub
Oct 9
Trending Stories
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
Nikto: Web Server Security Scanner
Nikto: Web Server Security Scanner
1. Introduction to Nikto
JJ Gallego
Sep 25
Open-Source Intelligence: Must-Have Tools for Uncovering Hidden Information
Open-source intelligence (OSINT) is evolving rapidly, driven by advances in machine learning and artificial intelligence. These new…
Ilah Johnson
Oct 6
Nuclei, a vulnerability scanner and OWASP Juice Shop
Nuclei, a vulnerability scanner and OWASP Juice Shop
What is Nuclei?
JJ Gallego
Sep 15
How to Self-Prepare for HACKING 2025?
How to Self-Prepare for HACKING 2025?
FREE Hacking Preparation | Free Certification, Internship
Tahir Ayoub
Oct 9
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
In the realm of cybersecurity, two significant challenges that organizations face are accidental data disclosure and malware threats. In…
Bytesofinfosec
Aug 2
OSINT for nicknames (Tookie-osint)
OSINT for nicknames (Tookie-osint)
Tookie-osint offers an intuitive and user-friendly interface designed for simplicity and effectiveness. This tool helps users uncover…
JJ Gallego
Sep 11
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Well, well! After the boom-bastic article on the Identification step in our bug bounty and penetration testing series on real Goverment…
Shaikh Minhaz
Sep 18
Navigating the Landscape of External Data Breaches: A Comprehensive Analysis
Navigating the Landscape of External Data Breaches: A Comprehensive Analysis
In the ever-evolving landscape of cybersecurity, information security professionals play a crucial role in safeguarding sensitive data from…
Bytesofinfosec
Aug 20
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
Simplifying Threat Detection with SIGMA: An Open-Source Solution
Simplifying Threat Detection with SIGMA: An Open-Source Solution
In today’s rapidly evolving cyber threat landscape, organisations are constantly seeking innovative ways to enhance their security posture…
Stefan Bargan
Jun 3
Unraveling Cyber Threats: Business Email Compromise and Spear Phishing Explained
Unraveling Cyber Threats: Business Email Compromise and Spear Phishing Explained
In the fast-paced world of cybersecurity, two significant threats loom large: Business Email Compromise (BEC) and Spear Phishing. Both can…
Bytesofinfosec
Aug 17
Building a Comprehensive Cybersecurity Homelab: Deploying a Honeypot with Microsoft Azure
Building a Comprehensive Cybersecurity Homelab: Deploying a Honeypot with Microsoft Azure
Step 1: Sign Up for Microsoft Azure
Denise Banks
Dec 7, 2023
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain Abidi
May 19
DIY WiFi Pineapple vs Real WiFi Pineapple
DIY WiFi Pineapple vs Real WiFi Pineapple
The WiFi pineapple is a great WiFi auditing tool from the Hak5 team. It has some great features and has improved with each generation…
m5kro
Oct 25, 2022
Navigating the Perils of Accidental Digital Services Compromise: A Comprehensive Exploration (part…
Navigating the Perils of Accidental Digital Services Compromise: A Comprehensive Exploration (part…
In today’s fast-paced digital landscape, businesses often find themselves caught in the delicate balance between agility and security. In…
Bytesofinfosec
Aug 8
Nessus Guide: Auditing Networks and Remediating CVE-2024–39689
Nessus Guide: Auditing Networks and Remediating CVE-2024–39689
Install Nessus
JJ Gallego
Oct 1
Understanding Cyber Threats: DDoS Attacks and Malware Deployment
Understanding Cyber Threats: DDoS Attacks and Malware Deployment
In the realm of cybersecurity, Distributed Denial of Service (DDoS) attacks and malware deployment are critical threats that organizations…
Bytesofinfosec
Sep 1
Understanding Cyber Attack Trees: A Key Tool for Cybersecurity
Understanding Cyber Attack Trees: A Key Tool for Cybersecurity
In the realm of cybersecurity, visualizing and analyzing potential attack vectors is essential for strengthening defense mechanisms. One…
Bytesofinfosec
Jul 24
Search Smarter Not Harder: 30 Cyber Security Search Engines
Ilah Johnson
Oct 6
Hashcat vs John the Ripper (JTR)
Hashcat vs John the Ripper (JTR)
Hashcat and John the Ripper are both popular tools for password cracking. Both have pros and cons, and in this article, we will review some…
m5kro
Feb 12, 2023
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 2…
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 2…
Preventing Accidental Data Disclosure: Comprehensive Controls
Bytesofinfosec
Aug 11
Navigating the Waters of Information Technology Disaster Recovery Testing
Navigating the Waters of Information Technology Disaster Recovery Testing
In the realm of Information Security, safeguarding against unforeseen disasters is paramount. As an Information Security Professional based…
Bytesofinfosec
Aug 14
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams