Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
Navigating the Cyber Storm: An In-Depth Look at Cyber Crisis Management
In the vast digital ocean, where organizations sail through the complexities of the cyber world, a storm can hit at any moment. This storm…
Bytesofinfosec
May 29
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
A Beginner’s Guide to Cybercrime: Understanding the Digital Threat
In today’s world, cybercrime has become a familiar term that impacts us all. From stealing personal information to hacking government…
Stefan Bargan
May 23
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
Navigating the Cybersecurity Realm: Understanding and Mitigating Third-Party Cyber Risk
In the interconnected landscape of the digital era, safeguarding sensitive information goes beyond securing your own walls; it extends to…
Bytesofinfosec
May 22
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain M Abidi
May 19
Free Resources for Blue Teamers
Free Resources for Blue Teamers
Free courses to start your path in blue teaming.
Maisam Noyan
May 18
Creating a TryHackMe Room
Creating a TryHackMe Room
Hello everyone! I’m thrilled to be back on Medium after a brief hiatus. I have some exciting updates to share with you all:
Stefan Bargan
May 14
Trending Stories
Build Your Skills with Active Directory Home Lab
Build Your Skills with Active Directory Home Lab
Get hands-on experience with Active Directory and enhance your skills — all for free!
Denise Banks
May 5
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
Simone Kraus
Jan 5
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
Phishing Email Analysis: A Comprehensive Guide
Phishing Email Analysis: A Comprehensive Guide
Yesterday I was going through my spam emails and I saw an email that caught my interest. Today, I want to share my experience of analysing…
Stefan Bargan
Mar 31
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
Utilizing OSINT to Understand and Combat Fraud in E-Commerce
E-commerce has revolutionized the way we shop, offering convenience, variety, and often better prices. However, it has also opened new…
Golden Owl
Apr 8
How to Host a Website on the Dark Web
How to Host a Website on the Dark Web
In this article, I will show you how to set up a server that will host a website on the Dark Web.
Frost
Nov 15, 2023
Hack Cars Like Teslas, Using Flipper Zero.
Hack Cars Like Teslas, Using Flipper Zero.
Using the Key Fobs Replay Attacks.
Syed Zain M Abidi
Dec 28, 2023
Blue Team Labs Online — The Report Write-Up [No Answers]
Blue Team Labs Online — The Report Write-Up [No Answers]
The Report Scenario — You are working in a newly established SOC where still there is lot of work to do to make it a fully functional one…
Stefan Bargan
Feb 3
OSINT Analysis of a Real Fraudulent Email
OSINT Analysis of a Real Fraudulent Email
In an era where digital communication has become a cornerstone of our daily lives, email stands out as a prime channel for both legitimate…
Golden Owl
Feb 12
How Facebook Intercepts Your Web Traffic
How Facebook Intercepts Your Web Traffic
The Sinister Truth Behind Facebook’s Data Interception
Denise Banks
Apr 3
Enhancing Email Security: Stripping Attachments and Empowering Users
Enhancing Email Security: Stripping Attachments and Empowering Users
Introduction: Email communication is an integral part of our daily lives, connecting individuals and businesses worldwide. However, with…
Bytesofinfosec
May 7
How to Hack Wi-Fi Passwords in 2023 — WiFi Pentesting
How to Hack Wi-Fi Passwords in 2023 — WiFi Pentesting
Did you know that 🫵your Wi-Fi network is easily hackable? In this blog post, I will teach you how you can assess and hack your Wi-Fi…
Maisam Noyan
Sep 28, 2023
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
Flipper Zero: A Cybercrime Student’s Perspective on Device Security
In the rapidly evolving landscape of cybercrime, it’s essential for those of us pursuing an education in the field to have hands-on…
Stefan Bargan
Mar 28
Security Blue Team: Introduction to Vulnerability Management Course Review
Security Blue Team: Introduction to Vulnerability Management Course Review
I recently completed the “Introduction to Vulnerability Management” course offered by SBT, and I must say it was a comprehensive and…
Denise Banks
Jan 23
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain M Abidi
Apr 2
Power of VBS Scripting: Three Practical Examples
Power of VBS Scripting: Three Practical Examples
Welcome Back Pyshomongians, I am back With Another Blog and Today will teach You about What is VBS (Visual Basic Script) Which can pop up…
psychomong
Jan 15
How to Crack ZIP & RAR Files with Zydra
How to Crack ZIP & RAR Files with Zydra
Frost
Nov 18, 2023
Navigating Business Storms: The Essentials of Crisis Management Training
Navigating Business Storms: The Essentials of Crisis Management Training
In the dynamic sea of business, unforeseen storms can hit at any moment. These storms, or crises, come in various forms — natural…
Bytesofinfosec
May 13
Speed Up WPA Handshake Cracking With Keyspace Attacks
WPA handshakes are great but they’re useless if you can’t get a password from them. Most people use dictionary attacks or brute force for…
m5kro
Sep 7, 2022
Discover NIST’s Four New Free Online Courses on Risk Management
Today, I have some exciting news for those of you interested in cybersecurity and risk management. The National Institute of Standards and…
Stefan Bargan
Apr 13
Easily Reveal Hidden Passwords in any Browser
Easily Reveal Hidden Passwords in any Browser
Browsers offer the capability of remembering usernames and passwords. Most of us use this feature to automatically save our passwords to…
Frost
Feb 10
Detect Malicious Wi-Fi Attacks with Wireshark
Detect Malicious Wi-Fi Attacks with Wireshark
In this article, I will show you how to detect wireless deauthentication attacks on your network.
Frost
Dec 22, 2023
Blue Team Labs Online — ATT&CK Write-Up [No Answers]
Blue Team Labs Online — ATT&CK Write-Up [No Answers]
ATT&CK Scenario — You are hired as a Blue Team member for a company. You are assigned to perform threat intelligence for the company. See…
Stefan Bargan
Feb 3
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Navigating the Cybersecurity Landscape: Unveiling Threat Intelligence for Informed Defense
Introduction: In the dynamic realm of cybersecurity, the role of threat intelligence cannot be overstated. It serves as a beacon of…
Bytesofinfosec
Feb 10
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams