Professional Services

The Cyber Staff provides cybersecurity training, vulnerability research, and OSINT services to help individuals and small businesses protect their data with straightforward, actionable security plans.

The Cyber Short Newsletter

The latest cyber news and a weekly security tip in a short email message.

The Cyber Shot Training

Short remote training over Zoom to review the top 5 personal online security controls.

OSINT Shield

OSINT shield discovers your personal information online and helps you submit takedown requests.

What we stand for

Privacy

We believe privacy is a fundamental right and a responsibility we uphold in how we think, work, and build.

Education

We believe learning should be continuous and shared, because informed people make stronger decisions.

Support

We believe in showing up for others with consistency, respect, and follow-through; especially when it matters most.

About

Founded in 2019, The Cyber Staff, LLC provides local cybersecurity services and practical security guidance, pairing hands-on help with “bite-sized” training. The company also publishes The Cyber Short, a weekly newsletter featuring top security stories and actionable defense tips to help audiences stay ahead of emerging threats.

Blog

Latest blog posts below

Buff- Hackthebox lab

I began the assessment by performing an Nmap port scan to identify open services on the target machine. The scan revealed that port 8080 was open, hosting a web service with the intriguing HTTP title: Read more

Traverxec- Hackthebox

I began with an Nmap scan to identify open TCP ports, detect service versions, and run the default NSE scripts. The scan revealed two open ports: 22 (SSH) and 80 (HTTP). Port 80 was hosting Read more

Cap- Hackthebox lab

This machine has a webs server that has unauthenticated access with an IDOR (Insecure Direct Object Reference) vulnerability. By changing the number at the end of the URL, you can find a PCAP file with Read more

Administrator- Hackthebox lab

This lab came with Active Directory creds to simulate an assumed breach assessment. I started by checking the credentials with Netexec to confirm they worked. Next I ran Bloodhound-ce-python to collect Active Directory data for Read more

Get in Touch

Fill out the form to get in contact

Contact Us