0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

5 Tips to Prepare and Pass for the VMware VCP Exam
By: Vikrant Saran
May 15, 2018

The adoption of digital workspaces is indeed adding value to the core businesses with a new outlook for the business approach and processes. As a known fact, a comprehensive end-user computing platform is the backbone of this digital transformation drive. In this lane, VMware has witnessed a tremendous growth in India. The digital workspace solutions adopted by ...

CSIRT - Quick Guide & Overview
By: elazarbiro
May 14, 2018

CSIRT – What to do: A CSIRT may perform both reactive and proactive functions to help protect and secure the critical assets of an organization. There is not one standard set of functions or services that a CSIRT provides. The team chooses their services based on the needs of their ...

Denial of Service Using Malformed NTFS Files
By: seoweb2writer
May 14, 2018

A Romanian cyber security expert released a proof-of-concept- code that exposes the vulnerabilities in Windows7 / Windows 10, which can easily cause the blue screen of death, even when the system is locked.  This rogue code helps user or hacker deliver a denial of service type attack that can crash the windows machine within minutes, even when ...

How to Footprint Web Applications
By: Dr. Michael J. Garbade
May 14, 2018

Footprinting is an essential aspect of the hacking process. It involves acquiring vital information about the computer system or application to be targeted. It can be carried out either passively or actively. The passive collection of information implies the lack of active interaction between the attacker and the targeted system. In ethical hacking, footprinting is ...

The PGP key Panic: Safety 101
By: Joeri Jungschlager
May 14, 2018

Most of us have been using PGP for at least 5 years, some even more than 10 or 20. Nothing could be more stressful than our users and more our selves with the safety of PGP,  the Asymmetric key standard for encryption of emails and files. So the article:   Attention PGP Users: New Vulnerabilities Require You To Take Action ...

Protecting Your Online Information with Encryption
By: Jessica
May 13, 2018

With the recent rash of online security incidents that include data breaches and ransomware attacks, one thing has become clear: no information online is safe. If major entities like the email provider Yahoo!, the credit bureau Equifax, and software giant Adobe can fall victim to the data breaches carried out by cyber thieves, then everyday end users are certainly ...

Has Your Email Been Hacked?
By: Jessica
May 13, 2018

Back in the day, people used to anxiously wait for the mailman to drop off mail in their residential mailboxes. Instead of waiting by the mailbox, people now constantly refresh their email apps to check for new messages in their electronic mailboxes. Fast, convenient, and within the palm of one’s hands, email gives users a sense of control, especially ...

Tulpar - Python Web Application Vulnerability Scanner + Telnetlib
By: anilbaranyelken
May 8, 2018

This brief tutorial/guide is just to provide you with some basic information about Tulpar and port scanning. Tulpar means winged horse in Turkish mythology. It is an open source web vulnerability scanner for written to make web penetration testing automated. Tulpar has the following features: Sql Injection (GET Method) XSS (GET Method) ...

How Cyber Attacks Affect Your Business!
By: thomassujain
May 7, 2018

Cybersecurity Attacks Affect Your SEO and Overall Business! Stay Secure Deploying Smart Security Measures! Every company and online businesses are aware of cybersecurity breaches! It can happen from revenue or reputation standpoint. And the result of any cybersecurity attack is the loss of business data, business reputation, and customer goodwill. And for online websites, it also affects their ...

Is Your Information on Mobile Health Apps Safe?
By: Jessica
May 6, 2018

Everything you want or need is at your fingertips with mobile devices today. You can buy groceries online and play music with the sound of your voice with smart speakers like Amazon’s Echo. This power has given people more control over their lives, and that control has also transferred into an area that impacts many: health. Mobile health apps ...