Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Mastering Regular Expressions for Forensic Investigations
Mastering Regular Expressions for Forensic Investigations
Regular expressions, or “regex” for short, are powerful tools that enable investigators to search for specific patterns within text data…
Stefan Bargan
Jun 16
Safeguarding Your Digital Realm: A Comprehensive Guide to Cybersecurity ‘Vulnerability Scanning’
Safeguarding Your Digital Realm: A Comprehensive Guide to Cybersecurity ‘Vulnerability Scanning’
In the vast landscape of Information Security, understanding key concepts like “Vulnerability Scanning” is crucial. This guide aims to…
Bytesofinfosec
Jun 15
Frieren: Open Source WiFi Pineapple Alternative
Frieren: Open Source WiFi Pineapple Alternative
If you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…
m5kro
Jun 12
Is That Job Offer Real? Use OSINT to Find Out
Is That Job Offer Real? Use OSINT to Find Out
The internet has opened up a world of opportunities for job seekers, making it easier than ever to find and apply for jobs. However, it has…
Golden Owl
Jun 11
Navigating Rough Waters: A Guide to Business Continuity Plans
Navigating Rough Waters: A Guide to Business Continuity Plans
In the unpredictable sea of business, storms can emerge unexpectedly. Just like sailing in a boat, where unforeseen challenges threaten to…
Bytesofinfosec
Jun 9
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
Enhancing Email Security: Detonation of Attachments and Safe Attachments in Office 365 ATP
Enhancing Email Security: Detonation of Attachments and Safe Attachments in Office 365 ATP
In the realm of cybersecurity, protecting digital environments from malicious threats is a top priority. One key technique that plays a…
Bytesofinfosec
Jun 3
Trending Stories
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
In the rapidly evolving landscape of cybercrime, it’s essential for those of us pursuing an education in the field to have hands-on…
Stefan Bargan
Mar 28
Blue Team Labs Online — The Report Write-Up [No Answers]
Blue Team Labs Online — The Report Write-Up [No Answers]
The Report Scenario — You are working in a newly established SOC where still there is lot of work to do to make it a fully functional one…
Stefan Bargan
Feb 3
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
When we think of the internet, we usually picture the websites we visit every day — social media, news, online shopping. However, there’s…
Stefan Bargan
May 25
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
E-commerce has revolutionized the way we shop, offering convenience, variety, and often better prices. However, it has also opened new…
Golden Owl
Apr 8
How to Host a Website on the Dark Web
How to Host a Website on the Dark Web
In this article, I will show you how to set up a server that will host a website on the Dark Web.
Frost
Nov 15, 2023
Malware Reverse Engineering CTFs
Malware Reverse Engineering CTFs
Nourhanelyamany
Nov 3, 2023
Security Blue Team: Introduction to Vulnerability Management Course Review
Security Blue Team: Introduction to Vulnerability Management Course Review
I recently completed the “Introduction to Vulnerability Management” course offered by SBT, and I must say it was a comprehensive and…
Denise Banks
Jan 23
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
In today’s world, cybercrime has become a familiar term that impacts us all. From stealing personal information to hacking government…
Stefan Bargan
May 23
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
Simplifying Threat Detection with SIGMA: An Open-Source Solution
Simplifying Threat Detection with SIGMA: An Open-Source Solution
In today’s rapidly evolving cyber threat landscape, organisations are constantly seeking innovative ways to enhance their security posture…
Stefan Bargan
Jun 3
The Spectrum of Intelligence: A Comprehensive Guide
The Spectrum of Intelligence: A Comprehensive Guide
Intelligence is a multifaceted concept that extends beyond the realm of academic prowess or cognitive abilities. In the context of national…
Stefan Bargan
Mar 23
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
In the interconnected landscape of the digital era, safeguarding sensitive information goes beyond securing your own walls; it extends to…
Bytesofinfosec
May 22
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain M Abidi
May 19
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
Unlocking the Secrets of Digital Forensics: A Beginner’s Guide
In an increasingly digital world, understanding digital forensics is essential for solving crimes and protecting information. This blog…
Stefan Bargan
May 31
Submission Guidelines — CyberScribers
Submission Guidelines — CyberScribers
Welcome to CyberScribers! CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital…
Stefan Bargan
Dec 19, 2023
2024 Skill Upgrade: Dive into 14 Free Microsoft Courses
2024 Skill Upgrade: Dive into 14 Free Microsoft Courses
Hey fellow learners! Guess what? I’ve stumbled upon an absolute treasure trove — 14 incredible free Microsoft courses that are about to be…
Stefan Bargan
Feb 4
Detect Malicious Wi-Fi Attacks with Wireshark
Detect Malicious Wi-Fi Attacks with Wireshark
In this article, I will show you how to detect wireless deauthentication attacks on your network.
Frost
Dec 22, 2023
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
In the vast digital ocean, where organizations sail through the complexities of the cyber world, a storm can hit at any moment. This storm…
Bytesofinfosec
May 29
Free Resources for Blue Teamers
Free Resources for Blue Teamers
Free courses to start your path in blue teaming.
Maisam Noyan
May 18
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams