0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



If you are in IT field, you might be familiar with the name Cisco, the leading networking company. The company has established its legacy as the most trusted name in manufacturing and selling networking hardware, technologies and telecommunication requirements. Its products are changing our lives in numerous ways. The IT giant expands its service-areas by offering industry-specific ...


Many times I've heard Outlook users asking about OST to PST conversion. In fact, it's one of the most common topics among Microsoft Outlook users. Though both OST and PST are Outlook data files, both are different from each other. OST is an offline storage table while PST is a personal storage ...


Static Application Security Testing(SAST) or Secure code review is an inside-out (White box) test approach to identify the security vulnerabilities at code level. It is essential for an organization to identify and fix the security vulnerabilities at development stage to avoid last minute rush and improve the code quality which reduces the ...


There are a lot of people on Cybrary (and other platforms) that want to share their knowledge and be recognized for that. Here are some great ways that I've learned to promote yourself (your personal brand/business) through your online writing and work. Of course, this isn't just cyber security specific, but I figure it is beneficial for ...


Ask any end user or general IT administrator which cyber-attack they are most fearful of. There is a good chance they will respond with “Ransomware”. I would quickly argue that any IT administrator who is worth their paycheck should not be fearful of Ransomware. A robust backup plan, a tested and proven incident response/recovery plan and an ...


WordPress is the leading blogging platform. In the last decade or so, it has been adopted as a great platform for building dynamic websites. The reason for its increased popularity can be attributed to its huge community and user-friendly interface. One thing that most people don’t know is that this platform ...


So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see.One of the products that caught my eye was Darktrace they sell their product as the "Enterprise Immune System" essentially they are smashing Big Data ...


Imagine a scenario where we want to send a confidential message and don't want anyone except the recipient to read it. We will use every possible methods to make our message hidden from any third person. So here I am going to use LSB-Steganography method to hide our message inside an image. What is LSB Least Significant ...


I’ll admit that was I was very tempted to trick you all into reading this post by making the title ‘How to Hack Facebook,’ but I resisted. Unfortunately, that’s one of the most commonly asked questions in Cybrary support and shows just how important it is to keep your social media accounts secure.Those who are tempted to ...


According to Gartner, by 2020 worldwide public cloud services will account for $383 billion, a fifth of which (19%) will be Infrastructure as a Service. In a June 2017 report, Gartner put Microsoft as a leader in Magic Quadrant for Cloud Infrastructure as a Service, worldwide, along with Amazon Web Services. A ...