0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Is Destructive Malware Slowly Becoming a Common Trend?
By: sf_dod
March 8, 2018

  Ask any end user or general IT administrator which cyber-attack they are most fearful of. There is a good chance they will respond with “Ransomware”. I would quickly argue that any IT administrator who is worth their paycheck should not be fearful of Ransomware. A robust backup plan, a tested and proven incident response/recovery plan and an ...

How to Create and Manage MySQL WordPress Database Using WordPress phpMyAdmin
By: barrackdiego
March 8, 2018

WordPress is the leading blogging platform. In the last decade or so, it has been adopted as a great platform for building dynamic websites. The reason for its increased popularity can be attributed to its huge community and user-friendly interface. One thing that most people don’t know is that this platform ...

Introduction and Thoughts on DARKtrace: "The Enterprise Immune system"
By: Sean Mancini
March 7, 2018

 So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see.One of the products that caught my eye was Darktrace they sell their product as the "Enterprise Immune System" essentially they are smashing Big Data ...

Hide Secret Message Inside an Image Using LSB-Steganography
By: Shaquib Izhar
March 7, 2018

Imagine a scenario where we want to send a confidential message and don't want anyone except the recipient to read it. We will use every possible methods to make our message hidden from any third person. So here I am going to use LSB-Steganography method to hide our message inside an image. What is LSB Least Significant ...

How to Secure your Social Media Accounts: 10 Helpful Tips
By: Olivia
March 6, 2018

I’ll admit that was I was very tempted to trick you all into reading this post by making the title ‘How to Hack Facebook,’ but I resisted. Unfortunately, that’s one of the most commonly asked questions in Cybrary support and shows just how important it is to keep your social media accounts secure.Those who are tempted to ...

Best Practices for Infrastructure as a Service (IaaS) in Microsoft Azure
By: Masood
March 6, 2018

According to Gartner, by 2020 worldwide public cloud services will account for $383 billion, a fifth of which (19%) will be Infrastructure as a Service. In a June 2017 report, Gartner put Microsoft as a leader in Magic Quadrant for Cloud Infrastructure as a Service, worldwide, along with Amazon Web Services. A ...

Start Your InfoSec Career by Learning LINUX
By: El1t3S1D
March 6, 2018

   Did you know that learning Linux/UNIX is one of the most important aspects of learning Cyber-Security/Information-Security? Q. What is Linux?A. Its a freaking OS. Linux is a family of free and open-source software operating systems built around the Linux kernel. Linux is packaged in a form known as a Linux distribution (or distro for short) ...

Aegis Secure USB Key by Apricorn - Super Secure USB stick for data in transit
By: Sean Mancini
March 6, 2018

  Another cool gadget I saw at the Toronto Tech Security Conference was ultra-secure USB storage by Apricorn https://www.apricorn.com. Now, this is cool their product is a secure USB thumb drive or SSD portable hard-drive it features built-in encryption built into the chip meaning no software needed on the PC.They have a wide range of drives and ...

Flaw in μTorrent That Lets Hackers Control Your PC Remotely
By: shantanurauthan
March 5, 2018

Most of us are using the popular and handy software called μTorrent for downloading and streaming stuff and if you are one of them then you must download its latest version ASAP. You must have seen after pressing that red cross button to close torrent, it still runs in the background until you ...

Passive Scanning with Free Online Tools [Resources for Hackers]
By: RUm83r0
March 5, 2018

All white hat hackers should master different tools for different phases in penetration-testing (reconnaissance, scanning, gaining access, maintaining access, covering tracks/creating report). It takes months or maybe years to master all the tools for scanning.A lot of information gathering and scanning can be done by active scanning using tools from Kali Linux distro. But if you want ...