Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Navigating Information Security: Unveiling the Essentials of Business Impact Assessment
Navigating Information Security: Unveiling the Essentials of Business Impact Assessment
Introduction As businesses traverse the digital landscape, the importance of safeguarding operations against potential disruptions becomes…
Bytesofinfosec
Jul 9
My Honest Experience: Malcore vs. VirusTotal
My Honest Experience: Malcore vs. VirusTotal
For years, I was a loyal user of VirusTotal. It was my go-to tool for scanning files and URLs for potential threats. It was reliable…
Stefan Bargan
Jul 6
Navigating the Cybersecurity Landscape: A Guide to Critical Business Service Mapping
Navigating the Cybersecurity Landscape: A Guide to Critical Business Service Mapping
Introduction
Bytesofinfosec
Jul 3
Navigating the Digital Storm: Understanding IT Disaster Recovery Plans
Navigating the Digital Storm: Understanding IT Disaster Recovery Plans
In the fast-paced world of technology, where businesses rely heavily on digital systems and data, the importance of having a robust IT…
Bytesofinfosec
Jun 24
Mastering Regular Expressions for Forensic Investigations
Mastering Regular Expressions for Forensic Investigations
Regular expressions, or “regex” for short, are powerful tools that enable investigators to search for specific patterns within text data…
Stefan Bargan
Jun 16
Safeguarding Your Digital Realm: A Comprehensive Guide to Cybersecurity ‘Vulnerability Scanning’
Safeguarding Your Digital Realm: A Comprehensive Guide to Cybersecurity ‘Vulnerability Scanning’
In the vast landscape of Information Security, understanding key concepts like “Vulnerability Scanning” is crucial. This guide aims to…
Bytesofinfosec
Jun 15
Frieren: Open Source WiFi Pineapple Alternative
Frieren: Open Source WiFi Pineapple Alternative
If you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…
m5kro
Jun 12
Trending Stories
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
CONTROL ANIMALS BY USING FLIPPER ZERO
CONTROL ANIMALS BY USING FLIPPER ZERO
In this article, we will discuss how to use Flipper Zero to control Dogs and Bats.
Syed Zain M Abidi
Mar 15
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
E-commerce has revolutionized the way we shop, offering convenience, variety, and often better prices. However, it has also opened new…
Golden Owl
Apr 8
How to Host a Website on the Dark Web
How to Host a Website on the Dark Web
In this article, I will show you how to set up a server that will host a website on the Dark Web.
Frost
Nov 15, 2023
Security Blue Team: Introduction to Vulnerability Management Course Review
Security Blue Team: Introduction to Vulnerability Management Course Review
I recently completed the “Introduction to Vulnerability Management” course offered by SBT, and I must say it was a comprehensive and…
Denise Banks
Jan 23
Simplifying Threat Detection with SIGMA: An Open-Source Solution
Simplifying Threat Detection with SIGMA: An Open-Source Solution
In today’s rapidly evolving cyber threat landscape, organisations are constantly seeking innovative ways to enhance their security posture…
Stefan Bargan
Jun 3
The Spectrum of Intelligence: A Comprehensive Guide
The Spectrum of Intelligence: A Comprehensive Guide
Intelligence is a multifaceted concept that extends beyond the realm of academic prowess or cognitive abilities. In the context of national…
Stefan Bargan
Mar 23
Blue Team Labs Online — The Report Write-Up [No Answers]
Blue Team Labs Online — The Report Write-Up [No Answers]
The Report Scenario — You are working in a newly established SOC where still there is lot of work to do to make it a fully functional one…
Stefan Bargan
Feb 3
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
When we think of the internet, we usually picture the websites we visit every day — social media, news, online shopping. However, there’s…
Stefan Bargan
May 25
Discover NIST’s Four New Free Online Courses on Risk Management
Today, I have some exciting news for those of you interested in cybersecurity and risk management. The National Institute of Standards and…
Stefan Bargan
Apr 13
2024 Skill Upgrade: Dive into 14 Free Microsoft Courses
2024 Skill Upgrade: Dive into 14 Free Microsoft Courses
Hey fellow learners! Guess what? I’ve stumbled upon an absolute treasure trove — 14 incredible free Microsoft courses that are about to be…
Stefan Bargan
Feb 4
Easily Reveal Hidden Passwords in any Browser
Easily Reveal Hidden Passwords in any Browser
Browsers offer the capability of remembering usernames and passwords. Most of us use this feature to automatically save our passwords to…
Frost
Feb 10
Using Burp Suite to Analyze POST Data
Using Burp Suite to Analyze POST Data
Burp Suite is a set of advanced tools used to analyze websites. From scanners to fuzzers Burp has it all. In this article, we’ll review the…
m5kro
Mar 22
Detect Malicious Wi-Fi Attacks with Wireshark
Detect Malicious Wi-Fi Attacks with Wireshark
In this article, I will show you how to detect wireless deauthentication attacks on your network.
Frost
Dec 22, 2023
Hashcat vs John the Ripper (JTR)
Hashcat vs John the Ripper (JTR)
Hashcat and John the Ripper are both popular tools for password cracking. Both have pros and cons, and in this article, we will review some…
m5kro
Feb 12, 2023
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Introduction: In the dynamic realm of cybersecurity, the role of threat intelligence cannot be overstated. It serves as a beacon of…
Bytesofinfosec
Feb 10
Cloud Computers for Hacking
Cloud Computers for Hacking
Cloud computing has been around for a while now. There are offerings from many big tech companies and it's very cheap, sometimes free, to…
m5kro
Nov 12, 2023
Code Inspection Unveiled: Static and Dynamic Analysis in Information Security
Code Inspection Unveiled: Static and Dynamic Analysis in Information Security
Code inspection is a fundamental practice in software development, especially in the dynamic and ever-evolving field of Information…
Bytesofinfosec
Mar 5
Safeguarding Your Digital Kingdom: Understanding Cloud Access Security Brokers (CASBs)
Safeguarding Your Digital Kingdom: Understanding Cloud Access Security Brokers (CASBs)
In the vast landscape of the digital world, where cloud services reign supreme, it’s crucial for organizations to fortify their defenses…
Bytesofinfosec
Feb 22
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams