Cyber Writes Profile
Cyber Writes

@cyber_writes

Followers
387
Following
1
Media
22
Statuses
31

Cyber Writes is World’s First Dedicated Content-as-a-Service (CaaS) Platform For Cybersecurity to solve content needs for cybersecurity businesses.

India
Joined February 2023
Don't wanna be here? Send us removal request.
@cyber_writes
Cyber Writes
2 years
Merry Christmas 🎄 @cyber_writes
0
0
1
@cyber_writes
Cyber Writes
2 years
Types of Databases @cyber_writes
Tweet media one
0
1
9
@cyber_writes
Cyber Writes
2 years
RT @DailyDarkWeb: 100 Useful Forensic Tools. Credit: @cyber_writes. #cybersecurity #infosec
Tweet media one
0
65
0
@cyber_writes
Cyber Writes
2 years
Malware and Ransomware Types @cyber_writes
0
0
5
@cyber_writes
Cyber Writes
2 years
15 Types of Cyber Attack @cyber_writes
0
0
8
@cyber_writes
Cyber Writes
2 years
Information Security Governance @cyber_writes
0
0
4
@cyber_writes
Cyber Writes
2 years
Wireshark Cheat Sheet @The_Cyber_News
Tweet media one
0
2
3
@cyber_writes
Cyber Writes
2 years
Secure API @cyber_writes
Tweet media one
1
0
4
@cyber_writes
Cyber Writes
2 years
Network Protocols @cyber_writes
Tweet media one
0
2
4
@cyber_writes
Cyber Writes
2 years
API Architectural Styles @cyber_writes . #CyberSecurity #ContentCreator
0
1
1
@cyber_writes
Cyber Writes
2 years
Multiple ArubaOS vulnerabilities Let Attackers Execute Arbitrary Code @The_Cyber_News. These vulnerabilities are related to Buffer Overflow and Hardware Root of Trust bypass. Discover more: #cybersecurity #vulnerabilities #ArubaOS #protectyourdevices.
Tweet card summary image
gbhackers.com
ArubaOS released patches for multiple vulnerabilities affecting Aruba Switches which were related to Stored Cross-site Scripting (Stored XSS), Denial of Service (DoS).
0
1
0
@cyber_writes
Cyber Writes
2 years
Threat actors continue to evolve their tactics, modifying malware DGA patterns to enhance C2 communication and make analysis more challenging. @The_Cyber_News. Discover more: #cybersecurity #malware #threatactors.
Tweet card summary image
cybersecuritynews.com
A Domain Generation Algorithm (DGA) creates numerous domain names, serving as meeting points for malware C&C servers.
0
1
0
@cyber_writes
Cyber Writes
2 years
Life of DNS Query @cyber_writes
0
0
1
@cyber_writes
Cyber Writes
2 years
Open Source SIEM Tools @cyber_writes
Tweet media one
1
1
4
@cyber_writes
Cyber Writes
2 years
Discover the Top 🔟 DDoS Protection Tools and Services available. Stay protected against cyber attacks and safeguard your business with these powerful tools. @The_Cyber_News. Discuss more: #cybersecurity #informationsecurity #onlinesecurity #DDoSprotection.
Tweet card summary image
cybersecuritynews.com
Best DDoS Protection Tools: 1. AppTrana 2. Cloudflare 3. Azure DDoS Protection 4. AWS Shield 5. SolarWinds SEM Tool Arbor Networks.
0
2
3
@cyber_writes
Cyber Writes
2 years
OSI Layers @cyber_writes
0
0
4