Homepage
Open in app
Sign in
Get started
CyberScribers: Exploring Cybersecurity
Embark on a narrative journey into the heart of cybersecurity on Medium. CyberScribers curates compelling stories from diverse authors, delving into the intricate world of digital security.
About CyberScribers
Latest Stories
Submission Guidelines
Follow
Latest Stories
CYBER-SECURITY: Session Hijacking
CYBER-SECURITY: Session Hijacking
What is Session Hijacking? Session hijacking is an attack where a hacker takes control of a valid communication session between two…
Asad Mohsin
Dec 1
What is Spoofing in Cyber Security 2025?
What is Spoofing in Cyber Security 2025?
What is spoofing with an example?
Tahir Ayoub
Dec 1
System Hacking Technique
System Hacking Technique
System hacking technique in cyber security
Tahir Ayoub
Nov 27
Misconception of lone wolves in cyberspace
Misconception of lone wolves in cyberspace
Root cause of today’s form of terrorism & hacktivism are nation state actors who orchestrate operations
SIMKRA
Nov 23
Rapid7 Uncovers Sophisticated Microsoft Exchange Domain Compromise via SharePoint Vulnerability
Rapid7 Uncovers Sophisticated Microsoft Exchange Domain Compromise via SharePoint Vulnerability
Rapid7’s Incident Response team recently unearthed a complex cyberattack involving a Microsoft Exchange service account with domain…
Sagar
Nov 22
Hacking Bot: Build A Hacking Bot
Hacking Bot: Build A Hacking Bot
Building an AI Hack bot without Python
Tahir Ayoub
Nov 17
Zero-Day Shenanigans: A Stark-Style Tech Tale
Zero-Day Shenanigans: A Stark-Style Tech Tale
Hello people!!!😊👋Whether you’re here for laughs, insights, or just stumbled in accidentally, I’m sure you will enjoy and learn something…
unica 02
Nov 16
Trending Stories
Nikto: Web Server Security Scanner
Nikto: Web Server Security Scanner
1. Introduction to Nikto
JJ Gallego
Sep 25
3 Best Search Engines for Hacking
3 Best Search Engines for Hacking
Awesome Hacker Search Engines
Tahir Ayoub
Oct 25
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
From Beginner to Pro: Websites That Will Skyrocket Your Cybersecurity Skills
Diving into the world of cybersecurity can feel daunting at first, but thankfully, there are plenty of online resources to guide you every…
Stefan Bargan
Oct 11
Navigating the Depths of Cybersecurity: Insider Threats and Software Compromises
Navigating the Depths of Cybersecurity: Insider Threats and Software Compromises
In the realm of cybersecurity, understanding the intricacies of insider threats and software compromises is crucial for safeguarding…
Bytesofinfosec
Aug 23
E-Mail Threat Types to Business
E-Mail Threat Types to Business
Email is an extremely popular method of communication.
Asad Mohsin
Nov 10
OSINT for nicknames (Tookie-osint)
OSINT for nicknames (Tookie-osint)
Tookie-osint offers an intuitive and user-friendly interface designed for simplicity and effectiveness. This tool helps users uncover…
JJ Gallego
Sep 11
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Live Bug Bounty Walkthrough: How to Hunt & Report Bugs Effectively (Part 2)
Well, well! After the boom-bastic article on the Identification step in our bug bounty and penetration testing series on real Goverment…
Shaikh Minhaz
Sep 18
Compliance Automation: Silver Bullet for Security or Just a Myth?
Compliance Automation: Silver Bullet for Security or Just a Myth?
Ensuring cybersecurity compliance has become both essential and increasingly challenging. With regulations like GDPR, ISO, SOC-2 and the…
Sekurno
Nov 6
DIY WiFi Pineapple vs Real WiFi Pineapple
DIY WiFi Pineapple vs Real WiFi Pineapple
The WiFi pineapple is a great WiFi auditing tool from the Hak5 team. It has some great features and has improved with each generation…
m5kro
Oct 25, 2022
Unveiling the Anatomy of a Cloud Environment Compromise
Unveiling the Anatomy of a Cloud Environment Compromise
In the digital age, the cloud has revolutionized the way organizations store and manage their data. However, with great convenience comes…
Bytesofinfosec
Sep 7
Unveiling the Threat: Third-Party Compromise in Cybersecurity
Unveiling the Threat: Third-Party Compromise in Cybersecurity
In the intricate landscape of cybersecurity, third-party compromise stands out as a formidable threat, capable of unleashing chaos on…
Bytesofinfosec
Aug 26
Nuclei, a vulnerability scanner and OWASP Juice Shop
Nuclei, a vulnerability scanner and OWASP Juice Shop
What is Nuclei?
JJ Gallego
Sep 15
How to Self-Prepare for HACKING 2025?
How to Self-Prepare for HACKING 2025?
FREE Hacking Preparation | Free Certification, Internship
Tahir Ayoub
Oct 9
Malware Reverse Engineering CTFs
Malware Reverse Engineering CTFs
Nourhanelyamany
Nov 3, 2023
Security Blue Team: Introduction to Vulnerability Management Course Review
Security Blue Team: Introduction to Vulnerability Management Course Review
I recently completed the “Introduction to Vulnerability Management” course offered by SBT, and I must say it was a comprehensive and…
Denise Banks
Jan 23
Unveiling the Dynamics of Insider Data Breaches: A Comprehensive Exploration
Unveiling the Dynamics of Insider Data Breaches: A Comprehensive Exploration
In the dynamic realm of cybersecurity, one of the escalating threats faced by organizations is the insider data breach. These breaches…
Bytesofinfosec
Aug 14
Extract Passwords & Other User Credentials with LaZagne
Extract Passwords & Other User Credentials with LaZagne
For non-medium members, read the article HERE.
Frost
Dec 3, 2023
The Spectrum of Intelligence: A Comprehensive Guide
The Spectrum of Intelligence: A Comprehensive Guide
Intelligence is a multifaceted concept that extends beyond the realm of academic prowess or cognitive abilities. In the context of national…
Stefan Bargan
Mar 23
Unraveling the Web: A Deep Dive into a Web Framework Compromise
Unraveling the Web: A Deep Dive into a Web Framework Compromise
In the fast-paced world of cybersecurity, even the most fortified web portals can succumb to the ingenuity of cybercriminals. This article…
Bytesofinfosec
Sep 4
Classification of IoT Vulnerabilities and Attack Types
Classification of IoT Vulnerabilities and Attack Types
Free Article
Asad Mohsin
Oct 27
Hacking Documentaries and Movies for Bug Bounty Hunters
Hacking Documentaries and Movies for Bug Bounty Hunters
Today, I will show some hacking documentaries and movies that are quite old but powerful enough to shape your entire career. Some are…
Tahir Ayoub
Oct 11
Crack WPA/WPA2 Wi-Fi Passwords with Pyrit
Crack WPA/WPA2 Wi-Fi Passwords with Pyrit
Pyrit is one of the most powerful WPA/WPA2 cracking tools for wireless hacking. It uses the power of multi-core processors and if required…
Frost
Oct 4, 2023
Understanding Cyber Attack Trees: A Key Tool for Cybersecurity
Understanding Cyber Attack Trees: A Key Tool for Cybersecurity
In the realm of cybersecurity, visualizing and analyzing potential attack vectors is essential for strengthening defense mechanisms. One…
Bytesofinfosec
Jul 24
New Instagram Crypto Scam That’s Too Good to Be True
New Instagram Crypto Scam That’s Too Good to Be True
A couple of days ago, I received a message request on Instagram that caught my attention — and I’m not ashamed to admit it was the…
Stefan Bargan
Aug 3
Empowering Cyber Guardians: The Synergy of Security Training and Awareness
Empowering Cyber Guardians: The Synergy of Security Training and Awareness
In the ever-evolving landscape of cybersecurity, two pillars stand tall in the defense against digital threats: security training and…
Bytesofinfosec
Mar 3
About CyberScribers
Latest Stories
Archive
About Medium
Terms
Privacy
Teams