Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
In an increasingly digital world, understanding digital forensics is essential for solving crimes and protecting information. This blog…
Stefan Bargan
May 31
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
In the vast digital ocean, where organizations sail through the complexities of the cyber world, a storm can hit at any moment. This storm…
Bytesofinfosec
May 29
Surveillance in the Digital Age: Are We Trading Privacy for Security?
Surveillance in the Digital Age: Are We Trading Privacy for Security?
Surveillance has been a part of human history for thousands of years. From ancient spies in Egypt to modern-day data mining, the methods…
Stefan Bargan
May 29
Hackers, Hacktivism, and Social Engineering: Unravelling the Mysteries of the Digital Underworld
Hackers, Hacktivism, and Social Engineering: Unravelling the Mysteries of the Digital Underworld
In an age where technology permeates every aspect of our lives, understanding the complexities of cybercrime has never been more crucial…
Stefan Bargan
May 27
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
When we think of the internet, we usually picture the websites we visit every day — social media, news, online shopping. However, there’s…
Stefan Bargan
May 25
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
In today’s world, cybercrime has become a familiar term that impacts us all. From stealing personal information to hacking government…
Stefan Bargan
May 23
Trending Stories
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
Simone Kraus
Jan 5
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain M Abidi
May 19
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Free Resources for Blue Teamers
Free Resources for Blue Teamers
Free courses to start your path in blue teaming.
Maisam Noyan
May 18
Phishing Email Analysis: A Comprehensive Guide
Phishing Email Analysis: A Comprehensive Guide
Yesterday I was going through my spam emails and I saw an email that caught my interest. Today, I want to share my experience of analysing…
Stefan Bargan
Mar 31
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
In the interconnected landscape of the digital era, safeguarding sensitive information goes beyond securing your own walls; it extends to…
Bytesofinfosec
May 22
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
E-commerce has revolutionized the way we shop, offering convenience, variety, and often better prices. However, it has also opened new…
Golden Owl
Apr 8
How to Host a Website on the Dark Web
How to Host a Website on the Dark Web
In this article, I will show you how to set up a server that will host a website on the Dark Web.
Frost
Nov 15, 2023
Hack Cars Like Teslas, Using Flipper Zero.
Hack Cars Like Teslas, Using Flipper Zero.
Using the Key Fobs Replay Attacks.
Syed Zain M Abidi
Dec 28, 2023
Blue Team Labs Online — The Report Write-Up [No Answers]
Blue Team Labs Online — The Report Write-Up [No Answers]
The Report Scenario — You are working in a newly established SOC where still there is lot of work to do to make it a fully functional one…
Stefan Bargan
Feb 3
OSINT Analysis of a Real Fraudulent Email
OSINT Analysis of a Real Fraudulent Email
In an era where digital communication has become a cornerstone of our daily lives, email stands out as a prime channel for both legitimate…
Golden Owl
Feb 12
How Facebook Intercepts Your Web Traffic
How Facebook Intercepts Your Web Traffic
The Sinister Truth Behind Facebook’s Data Interception
Denise Banks
Apr 3
Enhancing Email Security: Stripping Attachments and Empowering Users
Enhancing Email Security: Stripping Attachments and Empowering Users
Introduction: Email communication is an integral part of our daily lives, connecting individuals and businesses worldwide. However, with…
Bytesofinfosec
May 7
CONTROL ANIMALS BY USING FLIPPER ZERO
CONTROL ANIMALS BY USING FLIPPER ZERO
In this article, we will discuss how to use Flipper Zero to control Dogs and Bats.
Syed Zain M Abidi
Mar 15
How to Hack Wi-Fi Passwords in 2023 — WiFi Pentesting
How to Hack Wi-Fi Passwords in 2023 — WiFi Pentesting
Did you know that 🫵your Wi-Fi network is easily hackable? In this blog post, I will teach you how you can assess and hack your Wi-Fi…
Maisam Noyan
Sep 28, 2023
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
In the rapidly evolving landscape of cybercrime, it’s essential for those of us pursuing an education in the field to have hands-on…
Stefan Bargan
Mar 28
Security Blue Team: Introduction to Vulnerability Management Course Review
Security Blue Team: Introduction to Vulnerability Management Course Review
I recently completed the “Introduction to Vulnerability Management” course offered by SBT, and I must say it was a comprehensive and…
Denise Banks
Jan 23
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
Power of VBS Scripting: Three Practical Examples
Power of VBS Scripting: Three Practical Examples
Welcome Back Pyshomongians, I am back With Another Blog and Today will teach You about What is VBS (Visual Basic Script) Which can pop up…
psychomong
Jan 15
How to Crack ZIP & RAR Files with Zydra
How to Crack ZIP & RAR Files with Zydra
Frost
Nov 18, 2023
Creating a TryHackMe Room
Creating a TryHackMe Room
Hello everyone! I’m thrilled to be back on Medium after a brief hiatus. I have some exciting updates to share with you all:
Stefan Bargan
May 14
Navigating Business Storms: The Essentials of Crisis Management Training
Navigating Business Storms: The Essentials of Crisis Management Training
In the dynamic sea of business, unforeseen storms can hit at any moment. These storms, or crises, come in various forms — natural…
Bytesofinfosec
May 13
Speed Up WPA Handshake Cracking With Keyspace Attacks
WPA handshakes are great but they’re useless if you can’t get a password from them. Most people use dictionary attacks or brute force for…
m5kro
Sep 7, 2022
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams