0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How Much More Needs to be Compromised?
By: njbaker7
October 10, 2017

Just how many more data breaches or ransomware takeovers will it take until organization’s take information assurance AKA cyber security seriously? I know for a fact that we are nowhere near this end goal of data protection. If you have to blame a single technician for not patching a server that leads to a compromise, you need ...

UNM4SK3D: FBI, Equifax, and Net Neutrality
By: Olivia
October 6, 2017

#iphone Judge Tanya Chutkan for the United States District Court for the District of Columbia ruled that the FBI does not have to release the details about how much it paid and who was hired to unlock the San Bernadino terrorist’s iPhone 5C in 2016. You may recall the tragic San Bernadino incident ...

Convert MBOX to PDF with Attachments to Print MBOX Emails
By: stevesmith27
October 5, 2017

There are several situations where we need to batch convert MBOX to PDF format. In order to export MBOX to PDF format, users must need to go with the third party software i.e. MBOX to PDF converter. This enables users to access their MBOX data in PDF format to save MBOX emails in PDF format. In today’s ...

Updated Security+ Exam: SY0-501
By: Olivia
October 4, 2017

This post was reviewed/updated February 2019. Today, October 4, 2017, an updated version of the CompTIA Security+ exam was released primarily to partners, courseware developers, and instructors. The new code for this exam is SY0-501.That being said, CompTIA indicates that they will start their public marketing effort and release the exam to the public ...

Oracle's Next Generation Cloud Infrastructure
By: John Greene
October 4, 2017

Traditional cloud infrastructure is typically made up of virtual machines (VMs) running on top of a hypervisor. The hypervisor isolates the VMs (which share the same CPUs) then captures I/O from each VM to ensure they are abstracted from the hardware. The VM is therefore secure and portable as it sees only a software-defined NIC (network interface card). The ...

Being a CISO: A Bird's-Eye View
By: Sebastián Vargas
October 4, 2017

What is a CISO? A CISO is the information security officer of an organization, who must tell organizations to create security policies, manage those policies, information, assets, and risks associated with them, and create security programs and awareness plans. What is the profile of a CISO? There is not one ...

Celebrating National Cyber Security Awareness Month
By: Olivia
October 1, 2017

  It’s October at last and time to celebrate- not the release of pumpkin spice lattes or the fact that Halloween is around the corner, but National Cyber Security Awareness Month! This annual campaign is meant to raise awareness about the importance of cyber security (as if the numerous breaches in recent months weren’t enough).National Cyber Security Awareness ...

Some Thoughts on Vulnerability Management
By: g6sh
September 30, 2017

You've carried out a vulnerability scan of your organization and now how a report totaling possibly thousands of pages, listing hundreds of vulnerabilities over multiple devices. Chances are, adding to the problem will likely be the total lack of resources to be able to deal this in anything but an ad-hoc manner (one-player, whack-a-mole scenario). Not all vulnerabilities are ...

Tutorial: BeEF and Armitage/Cobaltstrike Integration – Part 03
By: ben
September 30, 2017

By  @theBenygreen Hello, Readers :-) This is the Part 3 of our tutorial on BeEF and Armitage/Cobaltstrike Integration: (Build botnet of browsers by using malicious extensions). Now that you are familiar with BeEF and the Armitage/Cobaltstrike integration by using Beefstrike, it's time to introduce a major limitation and how to overcome it. ...

UNM4SK3D: Deloitte, Cardiac Scan, and SVR Tracking
By: Olivia
September 29, 2017

#hacked Someone (or many groups of someones) has it out for US businesses. Another week and another breach in big business for the country. It was announced that 'Big Four' firm Deloitte is the latest to fall victim.  You may know Deloitte as one of the largest private accounting firms in the U.S. which ...