0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


The post originally appeared on the Thycotic blog! Check it out here Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?This World Password Day 2019 step into the world of a ...


Introduction Hello friends. I wanted to share about my recent passing of the CompTIA Security+ certification exam and what I did in preparation.But before I do, I want to share some of my background to give you an idea of where I was coming from:I had approximately 2 years of IT work experience with about ...


The DC-based non-profit’s strategic alliance will provide CSFI members access to the web’s largest cybersecurity training and career development platform College Park, MD - April 15, 2019 - The Cybersecurity Forum Initiative (CSFI) , a non-profit providing cyber warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training, today announced a new ...


This blog originally appeared on the Cisco Security Blog Original Author : Ben Nahorney You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access.Unfortunately, that’s not always the case. Sometimes ...


Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Malware is often known ...


Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project ...


In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is ...


Without a doubt, data is everywhere around us and we are always putting in an effort to increase the path as the world is interacting and improving more with the internet. Most of the industries have these days come to the conclusion that all the power behind data as well as understanding how it can improve as ...


Article posted courtesy of : Thycotic 1. Take the human element out of the equation whenever you can – Use a password manager that doesn’t require a user to remember their password to login to sensitive systems. 2. Remove unnecessary password rotations – I’m going to have to side with the NIST’s proposed password security policy changes coming up ...


The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding of threats in the ...