Professional Services

The Cyber Staff provides cybersecurity training, vulnerability research, and OSINT services to help individuals and small businesses protect their data with straightforward, actionable security plans.

The Cyber Short Newsletter

The latest cyber news and a weekly security tip in a short email message.

Vulnerability Scanning

Network vulnerability scanning for internal and external networks.

OSINT Shield

OSINT shield discovers your personal information online and helps you submit takedown requests.

What we stand for

Privacy

We believe privacy is a fundamental right and a responsibility we uphold in how we think, work, and build.

Education

We believe learning should be continuous and shared, because informed people make stronger decisions.

Support

We believe in showing up for others with consistency, respect, and follow-through—especially when it matters most.

About

Founded in 2019, The Cyber Staff, LLC provides local cybersecurity services and practical security guidance, pairing hands-on help with “bite-sized” training. The company also publishes The Cyber Short, a weekly newsletter and blog featuring top security stories and actionable defense tips to help audiences stay ahead of emerging threats.

Blog

Latest blog posts below

Administrator- Hackthebox lab

This lab came with Active Directory creds to simulate an assumed breach assessment. I started by checking the credentials with Netexec to confirm they worked. Next I ran Bloodhound-ce-python to collect Active Directory data for Read more

Support- Hackthebox lab

I started with an nmap scan for all TCP ports and the top UDP ports. This one looks like an Active Directory Domain Controller. Added target hostnames to /etc/hosts Looking through the SMB shares, I Read more

ServMon- Hackthebox lab

This box took a ton of troubleshooting and resets for the privilege escalation. The web server kept crashing but after many attempts, I finally got it finished. I start things off with a port scan Read more

Soccer- Hackthebox lab

I began the engagement by performing a full TCP and UDP port scan with Nmap to identify open services running on the target. A SYN scan was used on all TCP ports for speed and stealth, while Read more

Get in Touch

Fill out the form to get in contact

Contact Us