Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
The Technicalities of Cybersecurity: A deep dive into protecting digital assets.
The Technicalities of Cybersecurity: A deep dive into protecting digital assets.
The technicalities of Cybersecurity.
Ayomide
Apr 11
How to Pass AWS Certified Cloud Practitioner for FREE
How to Pass AWS Certified Cloud Practitioner for FREE
I passed my AWS Certified Cloud Practitioner three days ago (March 7, 2025) on my first attempt and I paid $0 for the preparation and will…
Maisam Noyan
Apr 3
Networking Basics in Cybersecurity: A Beginner’s Guide
Networking Basics in Cybersecurity: A Beginner’s Guide
Learn networking basics for cybersecurity With this beginner’s guide. Understand IP addresses, subnetting, firewalls, VPNs, and DNS…
Ayomide
Mar 29
Historical Hacks: Heartbleed
Historical Hacks: Heartbleed
Heartbleed exploited the OpenSSL library for more than two years.
Investigator515
Mar 28
Top 10 Vulnerabilities Every Hacker Should Know (And How to Exploit Them)
Top 10 Vulnerabilities Every Hacker Should Know (And How to Exploit Them)
Picture this: You’re locked out of your house, but instead of calling a locksmith, you notice a spare key hidden under the doormat. Oops…
Ahmad Javed
Mar 22
tool to generate XSS payloads.
tool to generate XSS payloads.
Free link in the comments
loyalonlytoday
Feb 19
Historical Hacks: Operation Aurora
Historical Hacks: Operation Aurora
This historical hack caused quite a stir when it was discovered
Investigator515
Feb 8
Trending Stories
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
Diving into the world of cybersecurity can feel daunting at first, but thankfully, there are plenty of online resources to guide you every…
Stefan Bargan
Oct 11, 2024
Unraveling the Web: A Deep Dive into a Web Framework Compromise
Unraveling the Web: A Deep Dive into a Web Framework Compromise
In the fast-paced world of cybersecurity, even the most fortified web portals can succumb to the ingenuity of cybercriminals. This article…
Bytesofinfosec
Sep 4, 2024
Nikto: Web Server Security Scanner
Nikto: Web Server Security Scanner
1. Introduction to Nikto
JJ Gallego
Sep 25, 2024
OSINT for nicknames (Tookie-osint)
OSINT for nicknames (Tookie-osint)
Tookie-osint offers an intuitive and user-friendly interface designed for simplicity and effectiveness. This tool helps users uncover…
JJ Gallego
Sep 11, 2024
Special Forces Unit 29155 — Assassination attempts, election manipulation, terrorist attacks…
Special Forces Unit 29155 — Assassination attempts, election manipulation, terrorist attacks…
Probably the most dangerous military cyber actor in the world
SIMKRA
Sep 7, 2024
How to use Bettercap
How to use Bettercap
Bettercap, the successor to Ettercap, is known as the Swiss Army knife for network hacking. It comes with various tools and modules to…
m5kro
Dec 25, 2022
Navigating the Depths of Cybersecurity: Insider Threats and Software Compromises
Navigating the Depths of Cybersecurity: Insider Threats and Software Compromises
In the realm of cybersecurity, understanding the intricacies of insider threats and software compromises is crucial for safeguarding…
Bytesofinfosec
Aug 23, 2024
How to Crack ZIP & RAR Files with Zydra
How to Crack ZIP & RAR Files with Zydra
Frost
Nov 18, 2023
Essential Linux Networking Commands for Cyber Security
Essential Linux Networking Commands for Cyber Security
Elevate Your Cybersecurity Practice with These Networking Commands
CyberSec Sentinel
Jul 7, 2024
Meet the malware Monsters
Meet the malware Monsters
Photo by Michael Geiger on Unsplash
unica 02
Oct 10, 2024
Nessus Guide: Auditing Networks and Remediating CVE-2024–39689
Nessus Guide: Auditing Networks and Remediating CVE-2024–39689
Install Nessus
JJ Gallego
Oct 1, 2024
Wireshark for Threat Detection🦈
Wireshark for Threat Detection🦈
How to Use Filters in Wireshark to Identify and Analyze Security Threats
CyberSec Sentinel
Dec 12, 2024
Unveiling the Anatomy of a Cloud Environment Compromise
Unveiling the Anatomy of a Cloud Environment Compromise
In the digital age, the cloud has revolutionized the way organizations store and manage their data. However, with great convenience comes…
Bytesofinfosec
Sep 7, 2024
Using Burp Suite to Analyze POST Data
Using Burp Suite to Analyze POST Data
Burp Suite is a set of advanced tools used to analyze websites. From scanners to fuzzers Burp has it all. In this article, we’ll review the…
m5kro
Mar 22, 2024
Essential Tools for SOC Analysts
Essential Tools for SOC Analysts
As a Security Operations Centre (SOC) analyst, having the right tools at your disposal is crucial for effective investigation, reputation…
Stefan Bargan
Jun 9, 2024
Navigating the Waters of Information Technology Disaster Recovery Testing
Navigating the Waters of Information Technology Disaster Recovery Testing
In the realm of Information Security, safeguarding against unforeseen disasters is paramount. As an Information Security Professional based…
Bytesofinfosec
Aug 14, 2024
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
Navigating the Landscape of Cybersecurity: Accidental Data Disclosure and Malware Threats (part 1)
In the realm of cybersecurity, two significant challenges that organizations face are accidental data disclosure and malware threats. In…
Bytesofinfosec
Aug 2, 2024
Frieren: Open Source WiFi Pineapple Alternative
Frieren: Open Source WiFi Pineapple Alternative
If you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…
m5kro
Jun 12, 2024
Data Breaches: What to Do If You’re Affected?
Data Breaches: What to Do If You’re Affected?
From major corporations to small businesses, no one is immune to the risk of a data compromise. If you find yourself on the receiving end…
K.A.Malikoo
Sep 25, 2024
Deepfakes: Is That Really Your Grandma Saying That..!?
Deepfakes: Is That Really Your Grandma Saying That..!?
Deepfakes, once a sci-fi concept, are now a chilling reality. This technology allows anyone with the right tools to create highly…
K.A.Malikoo
Aug 5, 2024
Signs That Indicate Your Mobile Phone Might Be Hacked
Signs That Indicate Your Mobile Phone Might Be Hacked
Friends, in today’s write-up we will be talking about the signs that indicate your mobile phone might be hacked.
Tahir Ayoub
Oct 9, 2024
Tools to get started in Cyber Forensics
Tools to get started in Cyber Forensics
Here are some of the forensics tools you would need to get started in Cyber Forensics
Enos Jeba
Sep 16, 2020
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
SIMKRA
Jan 5, 2024
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Well, well! After the boom-bastic article on the Identification step in our bug bounty and penetration testing series on real Goverment…
Shaikh Minhaz
Sep 18, 2024
Understanding Service Level Agreements (SLAs) in Information Security
Understanding Service Level Agreements (SLAs) in Information Security
Introduction
Bytesofinfosec
Dec 13, 2023
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams