Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Navigating the Landscape of External Data Breaches: A Comprehensive Analysis
Navigating the Landscape of External Data Breaches: A Comprehensive Analysis
In the ever-evolving landscape of cybersecurity, information security professionals play a crucial role in safeguarding sensitive data from…
Bytesofinfosec
Aug 20
Unraveling Cyber Threats: Business Email Compromise and Spear Phishing Explained
Unraveling Cyber Threats: Business Email Compromise and Spear Phishing Explained
In the fast-paced world of cybersecurity, two significant threats loom large: Business Email Compromise (BEC) and Spear Phishing. Both can…
Bytesofinfosec
Aug 17
Unveiling the Dynamics of Insider Data Breaches: A Comprehensive Exploration
Unveiling the Dynamics of Insider Data Breaches: A Comprehensive Exploration
In the dynamic realm of cybersecurity, one of the escalating threats faced by organizations is the insider data breach. These breaches…
Bytesofinfosec
Aug 14
Navigating the Waters of Information Technology Disaster Recovery Testing
Navigating the Waters of Information Technology Disaster Recovery Testing
In the realm of Information Security, safeguarding against unforeseen disasters is paramount. As an Information Security Professional based…
Bytesofinfosec
Aug 14
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 2…
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 2…
Preventing Accidental Data Disclosure: Comprehensive Controls
Bytesofinfosec
Aug 11
Navigating the Perils of Accidental Digital Services Compromise: A Comprehensive Exploration (part…
Navigating the Perils of Accidental Digital Services Compromise: A Comprehensive Exploration (part…
In today’s fast-paced digital landscape, businesses often find themselves caught in the delicate balance between agility and security. In…
Bytesofinfosec
Aug 8
Navigating the Perils of Accidental Digital Services Compromise A Comprehensive Exploration (part…
Navigating the Perils of Accidental Digital Services Compromise A Comprehensive Exploration (part…
Preventing Accidental Digital Services Compromise: Essential Controls
Bytesofinfosec
Aug 5
Trending Stories
My Honest Experience: Malcore vs. VirusTotal
My Honest Experience: Malcore vs. VirusTotal
For years, I was a loyal user of VirusTotal. It was my go-to tool for scanning files and URLs for potential threats. It was reliable…
Stefan Bargan
Jul 6
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
Cloning Hotel Keycards with Android
Cloning Hotel Keycards with Android
Most Hotels use NFC keycards. NFC stands for near field communication. It is used in a wide variety of products, from tags to keycards…
m5kro
Nov 17, 2022
Frieren: Open Source WiFi Pineapple Alternative
Frieren: Open Source WiFi Pineapple Alternative
If you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…
m5kro
Jun 12
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain Abidi
May 19
Unraveling an External Major Data Breach: A Deep Dive into Cyber Espionage (part 1)
Unraveling an External Major Data Breach: A Deep Dive into Cyber Espionage (part 1)
In the interconnected world of today, where businesses rely heavily on digital infrastructure, the specter of cyber threats looms large…
Bytesofinfosec
Jul 27
Extract Passwords & Other User Credentials with LaZagne
Extract Passwords & Other User Credentials with LaZagne
For non-medium members, read the article HERE.
Frost
Dec 3, 2023
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
In an increasingly digital world, understanding digital forensics is essential for solving crimes and protecting information. This blog…
Stefan Bargan
May 31
Easily Reveal Hidden Passwords in any Browser
Easily Reveal Hidden Passwords in any Browser
For non-medium members, read the article HERE.
Frost
Feb 10
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
In the realm of cybersecurity, two significant challenges that organizations face are accidental data disclosure and malware threats. In…
Bytesofinfosec
Aug 2
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Introduction: In the dynamic realm of cybersecurity, the role of threat intelligence cannot be overstated. It serves as a beacon of…
Bytesofinfosec
Feb 10
Cloud Computers for Hacking
Cloud Computers for Hacking
Cloud computing has been around for a while now. There are offerings from many big tech companies and it's very cheap, sometimes free, to…
m5kro
Nov 12, 2023
Code Inspection Unveiled: Static and Dynamic Analysis in Information Security
Code Inspection Unveiled: Static and Dynamic Analysis in Information Security
Code inspection is a fundamental practice in software development, especially in the dynamic and ever-evolving field of Information…
Bytesofinfosec
Mar 5
Safeguarding Your Digital Kingdom: Understanding Cloud Access Security Brokers (CASBs)
Safeguarding Your Digital Kingdom: Understanding Cloud Access Security Brokers (CASBs)
In the vast landscape of the digital world, where cloud services reign supreme, it’s crucial for organizations to fortify their defenses…
Bytesofinfosec
Feb 22
CONTROL ANIMALS BY USING FLIPPER ZERO
CONTROL ANIMALS BY USING FLIPPER ZERO
In this article, we will discuss how to use Flipper Zero to control Dogs and Bats.
Syed Zain Abidi
Mar 15
Study Warns of Cyber Professionals Transitioning to Criminal Activity
Study Warns of Cyber Professionals Transitioning to Criminal Activity
The Disturbing Trend of Cyber Professionals Embracing Criminality
Denise Banks
Mar 15
Navigating Information Security: Unveiling the Essentials of Business Impact Assessment
Navigating Information Security: Unveiling the Essentials of Business Impact Assessment
Introduction As businesses traverse the digital landscape, the importance of safeguarding operations against potential disruptions becomes…
Bytesofinfosec
Jul 9
The Power of Content Delivery Networks (CDNs) in Enhancing Internet Speed and Security
The Power of Content Delivery Networks (CDNs) in Enhancing Internet Speed and Security
In the vast landscape of the internet, Content Delivery Networks (CDNs) emerge as indispensable tools, shaping the way we experience online…
Bytesofinfosec
Jul 18
Safeguarding Networks: The Power of Redundancy Against DDoS Attacks
Safeguarding Networks: The Power of Redundancy Against DDoS Attacks
Introduction: In the dynamic landscape of Information Security, safeguarding networks against threats is paramount. One of the key…
Bytesofinfosec
Jan 23
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams