0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



As footprinting is to safety in ethical hacking domains for clients and customers using internet, then advocacy in net neutrality rules is the safest road ahead. The rules are changing lanes inside the Washington D.C. beltway. Internet fast lanes vs. slow lanes are being drafted at the FCC. Having just read the recently released ...


Some Cybrarians may not know about Cybrary Teams , so I figured I'd write a post on this service. Teams is "The learning and assessment tool of choice for IT and security teams at today's top companies." Ok, what does that mean? Essentially, Teams offers companies an LMS (Learning Management System) to track their training and assess their ...


Last year the world witnessed how some of the world’s top Web sites were taken down by “ Mirai ”, a zombie malware that hijacked “Internet of Things” (IoT) devices like wireless routers, digital video recorder and also security cameras in parts of the U.S. The attack was made simply by wringing the weak or default ...


#emergencypatch Looks like someone took a bite out of Apple. The macOS High Sierra was discovered to contain a bug where anyone with physical access to a computer running the latest version could bypass the secure login simply by putting “root” in the username field. Developer Lemi Orhan Ergin, founder of Software Craftsmanship ...


Let’s Talk Community Greetings to all the Cybrarians out there! I would like to talk about our community and how to make it grow and flourish! I like to go through the 0P3N articles looking for good information, new viruses, malware, tracking apps, etc. Occasionally I come across an article that in ...


Cyber Security Chronicles 5 Education: Cybersecurity’s Forgotten Remediation & Threat Prevention Tool The overall practice of cyber security is a vital part of a financially healthy and successful corporate environment. In the past companies have traditionally not made cyber security a top priority. However, this has changed in recent times because ...


WMI and C# - Part One In the series of articles titled "WMI and C#" we will learn how to harness the power of C# and WMI. In this first article, we will learn what is WMI and how to connect to it remotely using C#. WMI – what is that? WMI stands for Windows Management Instrumentation and ...


#hacked Shut up and drive. More like, "Shut up and don't tell users we were hacked." It has been discovered the ride service with the already questionable reputation, Uber, suffered a massive data breach in 2016. What's worse, they paid the hackers $100,000 to keep quiet. According to Bloomberg, the data of 57,000,000 drivers ...


The different types of training delivery modes are Classroom, Live Virtual, On-Demand, Bootcamp and One-on-one Training. You may choose any one of these as per your convenience and availability, as all of these training modes have proved to be highly effective and fruitful. Classroom Training This is one of the best choices for those looking for highly ...


As you may (or may not) know, in these days Cyber Extortion is a frequent problem. There is news about this issue each day. In May, I went to Vancouver, Canada, and during the connection between Houston and Vancouver, I met a U.S. lady aged about 70 years. During the flight, we talked about many things and ...