0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Insurance Coverage for GDPR Fines & Penalties
By: travissholt
August 22, 2018

Yes, there is insurance coverage for GDPR Fines & Penalties and with potential fines being 4% of previous year’s annual global turnover or $20mm Euros, whichever is  GREATER,  this is a good thing. Not a day goes by that I don’t get questions from companies of all sizes about GDPR. This includes the implications for their business. Most ...

CISM Certification: What’s the Benefit, and Why Does it Matter?
By: Tatianna
August 22, 2018

Get CISM Certified: The benefits and meaning There aren’t enough information security professionals to go around. That’s the word from a recent ISACA report , which found that 60 percent of organizations had open security positions which took on average three ...

How to Recover a Cisco IOS Router Password
By: oluwaseunmi
August 21, 2018

This technique is very useful for when you forget or misplace your router password. It gives you easy access to recover your router. What You Need Router (whose password is to be recovered) PC (laptop or desktop) Router Console cable (to connect PC to Router) ...

[BrakeSec Podcast] Windows Registry Runkeys, DNS Logging + More
By: BrBr
August 21, 2018

[embed]https://traffic.libsyn.com/brakeingsecurity/2018-028-final.mp3[/embed] If the player above does not load, you can listen to the podcast here: http://traffic.libsyn.com/brakeingsecurity/2018-028-final.mp3 Below are the show notes from our episode. We discussed a few topics this week, including: The issues we had enabling HTTPS on our main website, in a PaaS system (Libsyn) DNS logging, for forensic purposes ...

Notable Malware Attacks and Security Vulnerabilities
By: Jessica
August 19, 2018

Computer and Internet technologies have gone through amazing trends and developments that have always made headlines in the news since they’ve been around over the past several decades. With the way that these technologies have made everyday tasks like household budgeting and scientific research significantly easier and faster than ever before, they are certainly newsworthy. What have also made ...

What is Firmware?
By: Jessica
August 19, 2018

Computer-savvy or not, anybody who has ever touched a computer has heard the terms “software,” “hardware,” “adware,” “spyware,” and “malware,” whether it be from the news, the Internet, or everyday conversation. There’s another type of “ware,” however, that does not seem to be as familiar to many, but it should be: firmware. Firmware Defined Firmware is a very specific ...

Hardening WordPress Like a Boss
By: Sebastián Vargas
August 18, 2018

T here is a need to begin to better protect WordPress platforms. With the huge amount of IOC, where the WordPress platforms are attacked, which I have seen closely, I created this guide for free use. If you want to collaborate with me in any endeavor, you can contact me at sebastian.vargas@protonmail.com . If you do not believe ...

Understanding Netcat, the Swiss Army Knife for Ethical Hacking
By: Dr. Michael J. Garbade
August 17, 2018

Netcat (usually abbreviated as nc) is a powerful information security tool used for reading from and writing to network connections using the TCP or UDP protocol. Usamaazad , who has more than four years of cyber security experience and currently teaches people his skills, says that “contrary to most tools, Netcat is ...

Truths & Myths — Cyber Insurance for Social Engineering Fraud
By: travissholt
August 15, 2018

I’ve heard it more frequently over the past few weeks, “cyber liability insurance doesn’t cover anything.” That statement is usually followed by a story about someone who had a cyber claim that wasn’t covered. A majority of the time, these stories involve social engineering fraud. According to  Interpol , social engineering fraud is “a broad term ...

CISM Training: Specific Use Cases
By: Tatianna
August 14, 2018

CISM Training: Specific Use Cases Data breaches are getting worse. As noted by The Spectator , recent data suggests more than 140 million records are lost or stolen every month, while worldwide losses due to attacks such as business email compromise (BEC) will top $9 billion ...