0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Find out how fast your password can be hacked this World Password Day 2019!
By: purvikshah
April 26, 2019

The post originally appeared on the Thycotic blog! Check it out here Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?This World Password Day 2019 step into the world of a ...

Steps I Took to Pass the CompTIA Security+ Exam
By: sh0m3r
April 24, 2019

Introduction Hello friends. I wanted to share about my recent passing of the CompTIA Security+ certification exam and what I did in preparation.But before I do, I want to share some of my background to give you an idea of where I was coming from:I had approximately 2 years of IT work experience with about ...

Cybrary and CSFI Announce Strategic Alliance to Expand Training and Career Guidance Offerings to Cyber Warfare Professionals
By: SLWelty
April 15, 2019

The DC-based non-profit’s strategic alliance will provide CSFI members access to the web’s largest cybersecurity training and career development platform College Park, MD - April 15, 2019 - The Cybersecurity Forum Initiative (CSFI) , a non-profit providing cyber warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training, today announced a new ...

Social media and black markets
By: purvikshah
April 10, 2019

This blog originally appeared on the Cisco Security Blog Original Author : Ben Nahorney You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access.Unfortunately, that’s not always the case. Sometimes ...

Malicious Tactics
By: WhiteHat4Ever
April 9, 2019

Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Malware is often known ...

5 Basic Principles of Project Management that every project manager must know
By: Vikrant Saran
April 6, 2019

Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project ...

Reverse Engineering for Beginners: Basic Programming Concepts
By: Dra4hos7
April 5, 2019

In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is ...

What is Data Science?
By: oliviaperez
April 2, 2019

Without a doubt, data is everywhere around us and we are always putting in an effort to increase the path as the world is interacting and improving more with the internet. Most of the industries have these days come to the conclusion that all the power behind data as well as understanding how it can improve as ...

How do you create an Enterprise Password Policy that actually gets used?
By: purvikshah
March 29, 2019

Article posted courtesy of : Thycotic 1. Take the human element out of the equation whenever you can – Use a password manager that doesn’t require a user to remember their password to login to sensitive systems. 2. Remove unnecessary password rotations – I’m going to have to side with the NIST’s proposed password security policy changes coming up ...

The Hacker's Workflow
By: lowebrew
March 28, 2019

The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding of threats in the ...