0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A Bad Rabbit How To Secure Oneself Against Cyber Attack
By: Melisamarzett
September 26, 2018

What a cyber-attack is and how not to become its victim? What types of viruses exist and how to secure oneself against them?There are many viruses, and Bad Rabbit is one of them. The following article is about how to secure oneself against this virus and avoid cyber-attack.The Bad Rabbit virus demands a payment of 0, 05 bitcoin (a ...

Gap? What Gap? The Cybersecurity Talent is Out There!
By: NessaT
September 25, 2018

With the never-ending increase in cybersecurity risks, sophistication, and proliferation of cyber-threats, information security has never been more critical. It is vital that organizations understand its dangers, threats, and vulnerabilities before attackers do. For that, leadership must commit to governance, ensuring a robust IT infrastructure and assuming the costs of implementing a security-in-depth strategy and continuously identifying, ...

A Hacker Magazine for Hackers by Hackers
By: Doktor Esperanto
September 25, 2018

Arka Kapı is a hackers’ magazine that began its journey in Turkey. ‘Arka Kapı’ stands for back door. We’re publishing our fourth issue in Turkey as we introduce the first English issue to you. The internet today hosts the core components of personal freedom: freedom of speech,  freedom of trade, and freedom of self-advocacy. That is, as long as ...

Probable-ish: My Issue With Likelihood Precision
By: khelms
September 7, 2018

I've seen a visual representation attempting to explain Risk; Risk is a combination of probability and impact of a vulnerability being exploited. In theory, this visualization is great! But does it translate into practice? In this visualization, with some assumption, we can gather the following: Goal – stay safe while trying to ...

Get to Know Best Cloud SSO Providers For Your IT Business
By: Ugra Narayan Pandey
September 5, 2018

Employees in every organization have to face the headache of remembering a slew of account login credentials. For an individual, it becomes difficult to keep multiple things in one mind. It is so because already lots of tasks are there that a person needs to remember in mind and adding up the activity to learn passwords leads to stress ...

How to erase a hard drive and reuse it for something else
By: manishbhickta26
September 5, 2018

This post highlights different techniques to erase hard drives, each way fulfilling a particular purpose. Read on to know all these. Further, choose one among those to reuse hard drives for good.   According to the Resource Conservation and Recovery Act, Disposing, Reallocating, or Returning leased hard drives irresponsibly or improperly could land you into receiving a NOTICE ...

Get Your Technology Vendors to Pay for your Cyber Claims
By: travissholt
August 29, 2018

It is estimated by some experts that as many as 95% of cyber incidents are the result of a failure by one of your vendors. As large-scale data breaches and other cyber incidents continue to make national headlines, it is important for companies to think about how they are prepared to pay for a cyber ...

Cuckoo Installation Guide - Part 2
By: kunalgupta007
August 28, 2018

<< Cuckoo Installation, Part 1 ---------------MOVE TO VIRTUAL MACHINE----------------  To verify that the virtual machine has an internet connection, open cmd and ping and see if it replies.Download Python 2.7 ( https://www.python.org/download/releases/2.7/ )Download Python Pillow 5.2.0 ( https://pypi.org/project/Pillow/#files ).Install BothFor me, the Python Pillow ...

Cuckoo Installation Guide: Malware Sandboxing - Part 1
By: kunalgupta007
August 28, 2018

Cuckoo is an opensource project that was a part of Google Summer Code. Now Cuckoo Sandbox 2.0.0 is out. Sandbox is an automated dynamic malware analysis system. Earlier in January or February, I tried to implement it but it was not working well. However, my friend Ishan Bajaj was able to do so. Thus we have made this ...

5 Ways to Repair Excel Files
By: ankitsajwan90
August 26, 2018

How do we recover corrupted Excel files? How do we fix Excel files that are corrupted and cannot be opened? Are there any free Excel repair tools? These are some of the questions a user asks when Excel files get corrupted. MS Excel is a great tool from Microsoft that helps organize data, creating stats and analyses ...