Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas

Write for Us

We are always looking for experts to share their knowledge with the readers of
Yakṣas Blog by writing articles on their areas of interest.

We cover a myriad of topics—network security, malware analysis, application
security, GRC, hands-on tutorials for newbies and even good resources such as
books, movies and TV Shows related to the world of Cyber Security. Following are a
few article genres that top our list:

  • Certifications: Everything You Need to Know
  • Mass Surveillance
  • Information Privacy
  • Internet of Everything
  • Mobile Application Security

But, of course, we’re open to other topics also. So, if you’ve got an interesting idea,
we look forward to hearing from you. All you have to do is either fill the form below or drop us a mail at csc (at) yaksas (dot) in.

If you’re interested, then here’s the deal: there are a few basic steps that one has to
follow before submitting an article. First of all, we need to know the article idea so
that we can let you know whether it is relevant or not, or if we have already covered
the same in a previous posts.

Once the idea is discussed upon and approved, you can send us a proposal of what
you wish to include in the article or, in other words, the “Table of Contents” of the
article (ToC). After that, you can email your article. A technical review of the article
shall be done and the suitability of the same shall be intimated accordingly.

    *Name:

    *Email:

    *Article Title:

    *Table of Content / Abstract

    Solve the reCaptcha:

    Optin Form

    Search

    Follow us on Twitter

    My Tweets

    Categories

    Tags

    (ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

    Top Posts

    • Mona.py for exploit devs: 6 must know commands
      Mona.py for exploit devs: 6 must know commands
    • What is Adversary Emulation?
      What is Adversary Emulation?
    • Build Your Career in Cyber Security
      Build Your Career in Cyber Security
    • CISA: Everything You Need to Know
      CISA: Everything You Need to Know
    • Let there be no more MMS Scandals
      Let there be no more MMS Scandals
    • 7 Ways to Cover Your Device's Camera
      7 Ways to Cover Your Device's Camera

    © Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress