0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Understanding SkyGoFree
By: cybergary
May 8, 2019

Remote Access Trojans, or RATs, have been a key part of the cybersecurity landscape for many years. These remote tools are covertly deployed on target devices. Once installed, the program allows extensive control and surveillance through the device. In a ...

Hacking Tools You Should Learn in 2019
By: CyberX
May 8, 2019

Let's start with an analogy:A carpenter with many years of experience goes to a house to perform a job. He knows the tools at his disposal. When he needs to shave the bottom of the cabinet, for example, he goes to the truck and gets a belt sander. In short, he is able to use a wide range of ...

Setting up a Cyber Security Program – A CISO’s Guide.
May 7, 2019

Have you just taken up the role of CISO in your organization? Are you charged with the responsibility of building or maintaining the cybersecurity program your institution? Quite frankly, I neither envy you or your role. Perhaps like @MattEastwood depicted in the picture below, the responsibilities you shoulder is likely to ensure you do not get that desired ...

6 steps to IoT disaster
By: Joeri Jungschlager
May 5, 2019

So IoT is that buzzword used for prototyping, new technologies like ultra narrowband & updated machine2machine communication. There are a lot of good developments out there but there are also people, mainly consultants really comfortable with what they did. Resulting in cybersecurity disasters for operational technology. And a couple of questions cannot seem to be answered by people stuck ...

The State of Machine Learning in 2019
By: purvikshah
May 3, 2019

This blog originally appeared on the Cisco Security Blog, reprinted with permission Original Author : TK Keanini Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression I had. Our 2019 CISO Benchmark Report ...

Wanacry Ransomware analysis: detecting malicious network indicator and memory strings
By: Shaquib Izhar
May 3, 2019

In this post i will try to analyse wannacry Ransomware , i will try to do behavior analysis and will see what malicious network indicators we are getting , what command is it executing. Getting the binary  Downloading the Ransomware binary file from thezoo   , this repository ...

CISA vs CISM vs CISSP Certification: What Are the Differences and Which One Is Best For Me?
By: eshabarot
May 2, 2019

These abbreviations might puzzle your mind and also the definitions sound similar to one another. But if you look deeper you will actually find the difference from one another. Aspirants often confuse CISA, CISM, and CISSP from one another and take them as the same thing; however that not accurate. While CISA is pursued by ...

How to Make Your CSO delighted with Your Open Source choices
By: limor2019
May 2, 2019

  Choosing the right open source component It is almost impossible to find developers that do not use open source (or OS) components in their software. According to a report made last year by Synopsis , out of the 1,100 code bases that were audited in 2017, 96% contained OS ...

Under Qualified OR Over Qualified ? What Should I Do ?
By: WhiteHat4Ever
May 1, 2019

The interviewing process can often "feel like a job" within itself as the amount of time spent on interviews and searches can easily surpass forty hours a week. The field of cybersecurity is very high demand for EXPERIENCED professionals so the demand can create a dual sided coin of the field. The demand for experienced professionals places an emphasis ...

Wireless Access Points - Info Gathering and Impersonation
By: kenunderhill
April 29, 2019

PII Gathering A false access point, or fake WAP, is a passive information-gathering technique used by malicious hackers and cybersecurity professionals. The basic idea is a wireless access point that is designed to lure users and ...