0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Crypto-mining Malware: Evade AV Detection with WMI
By: markpepapa
April 28, 2018

Unlike ransomware which attacks all your important files and takes them as hostages, a crypto mining malware does not attack any of your files. Instead, it “borrows” your computational resources to do bitcoin mining for the attacker. It can take down a high-end server in just a few minutes by utilizing the CPU up to 90% or even more. ...

State of the Market: The SOC Analyst Career Track
By: Tatianna
April 27, 2018

So you want to be a security operations center (SOC) analyst.At the very least you’re considering the role — you’ve seen the data about emerging cybersecurity skills gaps, you want to know more about defending networks against cyber attacks and you’re willing to take on the challenges of advanced training and certification.But you have questions: What exactly ...

What's the Possibility of an Attack on your Social Media?
By: evanmorris
April 27, 2018

Don't brush aside potential risks!In one year alone, social media scams skyrocketed by 150% . Experts believe that this number will continue to climb because cybercriminals see social media as a fruitful target today. Unfortunately, businesses can't avoid social media though. This marketing is critical to many companies' success. Instead, these companies need to learn how to protect themselves. ...

Corporate Cybersecurity Supply Chain
By: cdoyle
April 26, 2018

Corporate Cybersecurity Management: Course Notes Presented by Carter Schoenberg contact@hemispherecybersec.com   Translating Technical Threats Into Understandable Business Terms Part 1 - Introduction to Corporate Legal concepts relative to cybersecurity TCO vs. ROI How does a spoliation order impact your liability as a cyber professional Supply Chain ...

Finding Security Against Invisible Malware
By: seoweb2writer
April 26, 2018

We live in a world of possibilities! The Good, the bad, and the ugly anything can happen. While innovators at Google are working hard to make it easy and safe for people to move around using driverless cars or self-driving cars, hackers, on the other hand, are already making life difficult for people hacking computer systems and ...

Netflix Account Takeover Vulnerability
By: Shaquib Izhar
April 26, 2018

Netflix Account Takeover with Google Obscure Email Vulnerability What is Obscure e-mail Vulnerability Obscure email vulnerability in Gmail is an interaction between two different ways of handling e-mail addresses which means shaquibdexter@gmail.com would be same as shaquib.dexter@gmail.com and this is also the same as dexters.h.a.q.u.i.b@gmail.com. But ...

Mr. Robot Vulnhub Write Up
By: aisherwood
April 25, 2018

Objective : Get Flag OVA Link : https://www.vulnhub.com/entry/droopy-v02,143/ Tools used : netdiscover, Nmap, Nikto,Metasploitt, truecrack, veracrypt As always, I have my trusty Kali VM and Mr. Robot VM setup in a host-only network. The first step is to find the IP address of ...

GroupWise 8 Migration to Office 365
By: alainajodi
April 25, 2018

How to Migrate GroupWise 8 to Office 365 Email: On the basis of user’s requirement GroupWise is continuously updating in-house and timely comes with new versions, GroupWise2008 is one of the updated editions of this software.  Even though GroupWise 2014 is the latest version but many users are still   using GroupWise8 and instead of update it, wants to ...

Convert from Lotus Notes!
By: kurtjohn
April 24, 2018

Export Lotus Notes to Exchange using the Best Software Solution - Microsoft Exchange is a reliable and cost-effective email collaboration & communication platform. It has wide-range of powerful features which makes the task more mobile and enhances business domain users. With the release of the latest version of the exchange , the demand and popularity ...

Cryptogram: Solved in 13 Minutes
By: brittanyb76
April 24, 2018

I am a cryptogram fanatic. Occasionally I will buy a newspaper just to solve one. Certainly, I could buy a book full of them, but I don’t see the fun in that. I also like my crosswords and comics.I am a linguist. I’ve written my rudimentary language, and I’ve written a few cryptograms of my own to challenge my ...