Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
Hire a Hacker “Dark Web Reality!
Hire a Hacker “Dark Web Reality!
How to Hire a Hacker?
Tahir Ayoub
Oct 12
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
Diving into the world of cybersecurity can feel daunting at first, but thankfully, there are plenty of online resources to guide you every…
Stefan Bargan
Oct 11
Hacking Documentaries and Movies for Bug Bounty Hunters
Hacking Documentaries and Movies for Bug Bounty Hunters
Today, I will show some hacking documentaries and movies that are quite old but powerful enough to shape your entire career. Some are…
Tahir Ayoub
Oct 11
Signs That Indicate Your Mobile Phone Might Be Hacked
Signs That Indicate Your Mobile Phone Might Be Hacked
Friends, in today’s write-up we will be talking about the signs that indicate your mobile phone might be hacked.
Tahir Ayoub
Oct 9
How to Self-Prepare for HACKING 2025?
How to Self-Prepare for HACKING 2025?
FREE Hacking Preparation | Free Certification, Internship
Tahir Ayoub
Oct 9
Search Smarter Not Harder: 30 Cyber Security Search Engines
Ilah Johnson
Oct 6
Open-Source Intelligence: Must-Have Tools for Uncovering Hidden Information
Open-source intelligence (OSINT) is evolving rapidly, driven by advances in machine learning and artificial intelligence. These new…
Ilah Johnson
Oct 6
Trending Stories
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Well, well! After the boom-bastic article on the Identification step in our bug bounty and penetration testing series on real Goverment…
Shaikh Minhaz
Sep 18
Nikto: Web Server Security Scanner
Nikto: Web Server Security Scanner
1. Introduction to Nikto
JJ Gallego
Sep 25
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9
My Honest Experience: Malcore vs. VirusTotal
My Honest Experience: Malcore vs. VirusTotal
For years, I was a loyal user of VirusTotal. It was my go-to tool for scanning files and URLs for potential threats. It was reliable…
Stefan Bargan
Jul 6
Technique Inference Engine, Top 10 Ransomware Calculator and Stop Ransomware Advisory CISA
Technique Inference Engine, Top 10 Ransomware Calculator and Stop Ransomware Advisory CISA
Rapid Incident Response with the help of prioritization — another great tool developed by the CTID Mitre Engenuity
SIMKRA
Sep 10
OSINT for nicknames (Tookie-osint)
OSINT for nicknames (Tookie-osint)
Tookie-osint offers an intuitive and user-friendly interface designed for simplicity and effectiveness. This tool helps users uncover…
JJ Gallego
Sep 11
New Instagram Crypto Scam That’s Too Good to Be True
New Instagram Crypto Scam That’s Too Good to Be True
A couple of days ago, I received a message request on Instagram that caught my attention — and I’m not ashamed to admit it was the…
Stefan Bargan
Aug 3
Nuclei, a vulnerability scanner and OWASP Juice Shop
Nuclei, a vulnerability scanner and OWASP Juice Shop
What is Nuclei?
JJ Gallego
Sep 15
Dread Unveiled: Navigating the Dark Web’s Reddit-like forum
Dread Unveiled: Navigating the Dark Web’s Reddit-like forum
Dread is a dark web forum that serves as a platform for users to discuss various topics, primarily focusing on darknet marketplaces and…
Stefan Bargan
Sep 14
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5
Cloud Computers for Hacking
Cloud Computers for Hacking
Cloud computing has been around for a while now. There are offerings from many big tech companies and it's very cheap, sometimes free, to…
m5kro
Nov 12, 2023
Check your Facebook is Hack or Not!
Check your Facebook is Hack or Not!
Follow These Six Steps Right Now.
Tahir Ayoub
Sep 30
Living with Trust Issues: The Human Side of Zero Trust Architecture
Living with Trust Issues: The Human Side of Zero Trust Architecture
A Story Unfolding Across Timelines.
Liat Portal
Sep 14
Special Forces Unit 29155 — Assassination attempts, election manipulation, terrorist attacks…
Special Forces Unit 29155 — Assassination attempts, election manipulation, terrorist attacks…
Probably the most dangerous military cyber actor in the world
SIMKRA
Sep 7
How to use Bettercap
How to use Bettercap
Bettercap, the successor to Ettercap, is known as the Swiss Army knife for network hacking. It comes with various tools and modules to…
m5kro
Dec 25, 2022
HACKING WIFI BY USING FLIPPER ZERO PART 1
HACKING WIFI BY USING FLIPPER ZERO PART 1
This Tutorial is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
HACKING WIFI BY USING FLIPPER ZERO PART 2
This information is for Knowledge purposes only.
Syed Zain Abidi
Apr 2
Unraveling the Web: A Deep Dive into a Web Framework Compromise
Unraveling the Web: A Deep Dive into a Web Framework Compromise
In the fast-paced world of cybersecurity, even the most fortified web portals can succumb to the ingenuity of cybercriminals. This article…
Bytesofinfosec
Sep 4
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
Exploring the Dark Web: What Lies Beneath the Surface of the Internet
When we think of the internet, we usually picture the websites we visit every day — social media, news, online shopping. However, there’s…
Stefan Bargan
May 25
Behind The Wall: Motion Detection By Using Flipper Zero.
Behind The Wall: Motion Detection By Using Flipper Zero.
A simple technique to use Flipper Zero to detect motion behind any wall.
Syed Zain Abidi
May 19
Introduction to KQL for SOC Analysts
Introduction to KQL for SOC Analysts
Kusto Query Language (KQL) is an essential tool for Security Operations Centre (SOC) analysts seeking to effectively investigate and…
Stefan Bargan
Jun 1
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
How I Landed a SOC Analyst Role: A Journey of Perseverance and Dedication
Landing a Security Operations Centre (SOC) Analyst role has been one of the most challenging yet rewarding experiences of my career. Here’s…
Stefan Bargan
May 22
Submission Guidelines — CyberScribers
Submission Guidelines — CyberScribers
Welcome to CyberScribers! CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital…
Stefan Bargan
Dec 19, 2023
Understanding Cyber Threats: DDoS Attacks and Malware Deployment
Understanding Cyber Threats: DDoS Attacks and Malware Deployment
In the realm of cybersecurity, Distributed Denial of Service (DDoS) attacks and malware deployment are critical threats that organizations…
Bytesofinfosec
Sep 1
Hackers, Hacktivism, and Social Engineering: Unravelling the Mysteries of the Digital Underworld
Hackers, Hacktivism, and Social Engineering: Unravelling the Mysteries of the Digital Underworld
In an age where technology permeates every aspect of our lives, understanding the complexities of cybercrime has never been more crucial…
Stefan Bargan
May 27
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams