0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

UNM4SK3D: Facebook, Huawei, and Nissan
By: Olivia
December 29, 2017

#cryptocurrency  Sure, everyone loves a funny cat video, but if you receive a video file ( packed in zip archive ) sent by someone through Facebook messenger, think twice before opening it. That video may just be a cryptocurrency mining bot.  Discovered by researchers from security firm Trend Micro, this new bot is spreading through Facebook ...

GDPR Made Simple
By: Christopher Bainbridge
December 28, 2017

Anyone who is not involved in the world of Information Security could be forgiven for not having heard about GDPR (General Data Protection Regulation) but if you are in this field you are more likely to have heard about it and wondered how it will affect practices in your role and across the business.I will attempt to ...

SaaS ( Software as a Service ) Benefits & Security Implications
By: Christopher Bainbridge
December 27, 2017

SaaS ( Software as a Service ) Benefits & Security Implications As use software-as-a-service grows, more and more small to medium businesses that utilise SaaS in order to remain agile and keep down hardware and maintenance costs, so do their concerns about SaaS security. So what are the benefits of ...

Digital Forensics Books Catalogue
By: Divya Lakshmanan
December 27, 2017

This article is your personal catalogue to apprise you about the standard books out there in the various branches of digital forensics. If formal education is not your forte - all you need is passion, time and the right resources to get the skills you desire. Dive into the books, get your hands dirty with ...

Installing Splunk Standalone and Agents on Ubuntu
By: Klimdy
December 26, 2017

Installing Splunk standalone and agents on Ubuntu It's my little guide to how to use Splunk , maybe I write more about Apps, configuration Splunk and another theme if you want it)))Before installing Splunk Enterprise, you need to download it, the easiest way is to do it "directly" on the server itself: ...

Who is Suitable for an ITIL certification course?
By: priyajatoliya
December 26, 2017

Information Technology Infrastructure Library, popularly known as ITIL, is a popular framework for the management of IT services all over the world. Increasing number of global IT companies has now adopted this framework to make sure that the services they offer are in line with the well-defined and consistent set of processes which include best practices. ...

Creating a Windows EXE FUD Reverse Shell in Python
By: Orion
December 25, 2017

What Is A Shell A shell is acts as an interface between the user and Operating system. You can use a shell to do many things such as view files, launch applications,  check network configurations, etc. Some examples would be Powershell in Windows and the Terminal in Linux. Reverse vs Bind Shells ...

TCP/IP Model
By: D3f3nd3r
December 24, 2017

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model: ·          Application : In ...

The Rules for Data Protection are Changing: Are you Ready for GDPR ?
By: Jide Olagundoye
December 23, 2017

Modern IT has created an electronic world to meet a variety of needs from simply providing information, to wide ranging and far reaching products and services. They are all available on the web. The individual communication and consumption has created a footprint of information and transaction history which is commercially useful. ...

OSI Model
By: D3f3nd3r
December 23, 2017

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect. This model defines seven separate layers. The layers in this model are: ·          Application : The ...