0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

UNM4SK3D: NiceHash, Android, and TeamViewer
By: Olivia
December 8, 2017

#hacked Bitcoin buyers beware. While the price of the popular cryptocurrency just crossed the $14,800 mark in less than 24 hours, that has made it an even more attractive target for hackers. One site, NiceHash, the largest Bitcoin mining marketplace, has recently fallen victim to hacking.  For those unfamiliar, NiceHash is a "cloud-based crypto-mining ...

5 Study Tips to Pass the CCNP Routing and Switching Exams
By: michaelwarne
December 8, 2017

Did your CCNA certification give you the platform you desired as a newbie? Are you ready to move to a more advanced level?Time to move to the next level of a higher level professional certification - “CCNP”! CCNP certification is a more in-depth study of basics covered in CNNA course. CCNP Routing and Switching are one of the 8 ...

AWS: Monitoring S3 With Events and SNS
By: Jawady Muhammad Habib
December 7, 2017

Howdy, everybody! This is Muhammad Habib Jawady in a new DevOps hands-on tutorial. In my first Amazon Web Services tutorial, I demonstrate how to leverage the S3 events feature and Simple Notification Service in order to monitor the actions taken on certain assets.This is a hands-on guide with no prerequisite skills even though the possession of an AWS account with the allowed ...

How do Certifications Boost your Career?
By: Vikrant Saran
December 7, 2017

Darwin’s Evolutionary Theory emphasis on ‘Survival of the fittest’ while explaining the theory of Natural Selection, is the most convincing and accepted one to date. “ When Nature’s rule can go by this stringency, it is obvious that an aspiring individual is compelled to adapt himself to the changing scenario in his physical environment. ” In this ...

Risk Management - The Key to Service Digitization
By: Jide Olagundoye
December 6, 2017

I recently read somewhere that we send around 205 billion emails across the world every day. Even the self-professed Luddites amongst us, have been forced to interact with technology in this age. Digital applications have become irresistibly pervasive.Businesses are expected to develop and deliver the innovation customers now demand to support their changed behavior.  Digitization ...

Multi-Face Recognition & Data Exploitation
By: Jawady Muhammad Habib
December 6, 2017

Multi-Face Recognition & Data Exploit with Python + Azure FaceAPI Howdy Azure users again,Today I will be showing you how to exploit the powerful Azure FaceAPI n order to extract data about people in images.I assume that you already read the previous article as there are some fundamentals you need to know about Azure in order ...

Data Encryption
By: ziednamouchi
December 6, 2017

Data Encryption Today, national security information, payment, trades, social numbers, medical records are all stored, used and transmitted online through connected devices such as laptops and smartphones.Organizations are at risk either from external or internal threats, and the proliferation of valuable data gives cyber criminals good opportunities to monetize stolen information.First of all, we must define ...

Footprinting FCC Net-Neutrality
By: SeaLibrarian
December 5, 2017

As footprinting is to safety in ethical hacking domains for clients and customers using internet, then advocacy in net neutrality rules is the safest road ahead. The rules are changing lanes inside the Washington D.C. beltway. Internet fast lanes vs. slow lanes are being drafted at the FCC. Having just read the recently released ...

Have You Seen Cybrary Teams?
By: ginasilvertree
December 2, 2017

Some Cybrarians may not know about Cybrary Teams , so I figured I'd write a post on this service. Teams is "The learning and assessment tool of choice for IT and security teams at today's top companies." Ok, what does that mean? Essentially, Teams offers companies an LMS (Learning Management System) to track their training and assess their ...

Reaper – Calm Before IoT Botnet Attack
By: Aman2406
December 1, 2017

Last year the world witnessed how some of the world’s top Web sites were taken down by “ Mirai ”, a zombie malware that hijacked “Internet of Things” (IoT) devices like wireless routers, digital video recorder and also security cameras in parts of the U.S. The attack was made simply by wringing the weak or default ...