0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report As many cybersecurity professionals know, the threat landscape is continuing to become more complex, with large increases in cybercriminal activity around the world. 2017 was no exception. In their Annual Cybersecurity Report (ACR), ...


Hi dear hackers. Hacking database is a pretty cool thing you wanna do. Why databases? Certainly its about the information it holds such as passwords, credit card numbers even your girlfriend's phone number. So here I'm going to explain how can we hack into databases using sqlmap which is based oSQLql injection. So you ready? Ok let's begin. Before you ...


It’s no surprise that cryptocurrency has been in the news lately. Between the rising popularity of Blockchain technology, the fluctuating value of cryptocurrency, and the creation of new currencies almost daily, many individuals (and hackers) have jumped on their chance at turning a profit from cryptocurrency. What has emerged from this trend is a wave of malicious money making via ...


Bom dia, empresários que precisam de um bom suporte de TI venham para a wtech suporte informatica, podemos lhe oferecer o melhor em gerenciamento de redes e segurança contra invasão e sequestro de dados, proteja suas informações e tenha total controle do que acontece em sua rede de computadores e internet.O PFSense é uma ferramenta baseada em ...


As the title says, Coinhive is a JavaScript Cryptocurrency miner for Monero Blockchain. This piece of script, provided by the Coinhive website, offers a another source of income for any website administrator. Any website admin can sign up for Coinhive and can embed the JavaScript miner to their websites. When any user visits the website, ...

When you build a new internet which is based on a wireless mesh-network you want to make sure it gives the best possible solution to end users rather than just being seen as a gimmick. Luckily this is precisely what has been done with the developers of Skywire. With ...


Last year in May 2017, the world had witnessed a severe cyber attack, called WannaCry Ransomware attack. This cyber attack had targeted only the Windows users all around the world and demanded a ransom in the form of Bitcoin cryptocurrency. It was considered a network worm because it uses a ...


Summary : With the launch of Windows 10, applications like Microsoft Outlook underwent many significant transformations. For example, once Outlook was installed and configured to be used with the new operating system, users reported facing unexpected errors like repetitive prompts to re-enter their login password. Usually, the reason behind such erratic Outlook behavior is some problem with its ...


Hi there, I'm Praveen, Now we gone see the Useful tools, plugin available in GitHub for python developers.There lot of algorithm procedures available in online for a developer which is useful to develop your own applications. Here something to share,1) Cryptography : C ryptography : A package designed to expose cryptographic primitives ...


Convert OLM to PST format easily after that you can easily import OLM files to Outlook (Windows) with the help of all on one OLM converter which is fully loaded with advanced features. Outlook has consistently been ideal and default desktop mailing application for most of the users ...