Hackers, Welcome back! Here we are again with the fourth round of the result announcement by & HackerNoon! Cybersecurity Writing Contest Twingate How do we enter the contest? Easy-peasy. Simply share any story on . Here’s your complete guide on how to . #cybersecurity enter the cybersecurity writing contest The Cybersecurity Writing Contest September 2022 Nominations We picked all the stories tagged with the tag on HackerNoon, published in July 2022. As usual, we chose the top stories using weightage respectively to: #cybersecurity 60:30:10 Number of hours read The number of people reached The freshness of the content Here are the top 10 nominations for the fourth round: by . How an 18-Year-Old Teen Breached Uber Without Hacking a Single System @antagonist by . The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public @dailyabay by . Violent Attack Vectors in Web3: A Detailed Review @officercia by . How to Create a Random Password Generator Using Python @terieyenike by . 5 Ways to Protect Yourself From Getting Scammed in the Crypto World @dimenkodima by . “Hackers for Hire” Is a Rising Industry That Demands Ethical Considerations @craiglebrau by . What is ARP Spoofing and How to Protect Against It? @officercia by . The Massive Uber Hack: Technical and Legal Implications @aswagaawy by . A Former Hacker’s 10 Tips on Staying Safe Online @propublica by . How to Encrypt a PDF Using Python @terieyenike Winners! The editors then voted for the top stories. Here are the winners for the month of September 2022: The FIRST place goes to by . How an 18-Year-Old Teen Breached Uber Without Hacking a Single System @antagonist “The user went all in. Very timely and insightful story in the wake of the massive Uber leak (and a reminder to take your organization's phishing seminars seriously).” - HackerNoon Editor Great job !! You have won 500 USD! @antagonist In the SECOND place, as well as the winner of the Most Read Story, we have by . The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public @dailyabay “A listicle...but done the right way!” - HackerNoon Editor 21,000+ reads! Damn. Congratulations , you have won 300+100=400 USD! @dailyabay Last but not least, the THIRD place goes to by . What is ARP Spoofing and How to Protect Against It? @officercia “Spoof” sounds like a sound effect for an airbag going off in a car or something. Sure, “spoofing” sounds like a funny word but when it comes to security it is anything but. It is the intentional act of camouflaging malicious actors and intent under the guise of legitimate behavior.” Great story . You have won 100 USD!! @officercia Congratulations again to all the winners, and best of luck to the nominees and future participants of the . Let’s wrap up the announcement! We will contact the winners shortly. Keep an eye on to see the current and upcoming writing contests! Cybersecurity Writing Contest contests.hackernoon.com