0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

UNM4SK3D: CIA, MalwareTech, and Self-Driving Cars
By: Olivia
August 11, 2017

#wikileaks  You didn't think Wikileaks was going to stop anytime soon, did you? The latest, 20th leak discloses the details of 'CouchPotato,' a remote tool used to secretly collect RTSP/H.264 video streams. In a guide that dates back to February 14, 2014,  'CouchPotato' is described as a tool that allows for "a RTSP/H.264 video stream to be collected either ...

Cyber Fact: Passphrases
By: Olivia
August 10, 2017

According to statistics from SecurityIntelligence, “For small and midsized organizations (SMBs), 60% of employees use the exact same password for everything they access. Meanwhile, 63% of confirmed data breaches leverage a weak, default or stolen password.” Passphrases vs. Passwords A password is a string of characters used to verify the identity of a ...

Insider Threats Are the Greatest Risk to Your Data
By: superv3k900
August 10, 2017

Insider Threats Are the Greatest Risk to Your Data — Here’s How to Stop Them Stephen Voorhees, CISSP, Veriato Most companies have already hunkered down to prevent hackers from stealing proprietary data. Their security teams have almost certainly installed powerful firewalls. Some companies may have acquired robust security systems to protect themselves against ...

SOC Analyst: Interview Preparation
By: Olivia
August 9, 2017

 A few weeks ago, I was talking with a Cybrarian who had an upcoming interview for a SOC Analyst position and wanted some advice on how to best prepare. Aside from the general ‘interview success’ tips I knew offhand, I couldn’t provide much advice tailored to that role. So, I decided to do some research (as I ...

Tequila – The First Latin American Computer Forensic’s Operative System
By: andresBello
August 9, 2017

Hello and cheers from Colombia, my dear Cybrarians  😊 In the world of digital forensics science, there have been created several sorts of tools focused on the analysis of media devices and a help to conduct investigations related to security incidents. The community of people which are involved in these tasks ...

CASP Transcender Practice Test Question Preview
By: Olivia
August 9, 2017

We've been asked whether or not courses alone are enough to pass certification exams. While the videos in our courses provide valuable insight into the material covered on the exam, the questions included in the Transcender material (which are the same products as those offered on the Transcender site, just sold at a discounted price on Cybrary) are mapped directly ...

Tutorial: Creating a USB Bootable Version of Kali Linux with Persistence
By: island3r
August 9, 2017

Before we start, I know, there are tons of instructions around the web for creating a USB bootable version of Kali with Persistence, but I’ve decided to create my own after running into a few difficulties which will hopefully help a few people. Here’s what I’m using: 16GB SanDisk USB3 stick ...

Cyber Fact: Malware
By: Olivia
August 8, 2017

According to CSO, “Global ransomware damage costs are predicted to exceed $5 billion in 2017. That's up from $325 million in 2015, a 15X increase in two years, and expected to worsen. Ransomware attacks on healthcare organizations, the No. 1 cyber-attacked industry, will quadruple by 2020.” What is malware? Malware is ...

Top 5 IT Job Trends: Skills & Certifications
By: jrinehard
August 8, 2017

Today, end users have different expectations of their IT departments than they previously did. Large developments in networking capacity, media streaming, data processing, and the Internet, in general, have accounted for very different preferences. These trends will most likely continue and IT administrators should prepare by having a well-rounded IT team. This is becoming the norm regardless ...

Capture the Flags: What They Mean for Security
By: Olivia
August 7, 2017

Capture the flags are just one form of valuable cyber security training that inspire productive competition and serve as an educational exercise for participants. In a security CTF, the contestants may be tasked with securing a machine, conducting or reacting to attacks, similar to those found in the real-world.The first CTF was developed ...