0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Women In Cyber - Pursuing Passion
By: Responsible Cyber
July 20, 2017

I have launched a  Women In Cyber Initiative  and I feel overwhelmed by all the support received from my contacts: men and women.  With the current situation in cyber security, the forecasted skill shortfall, the security challenges and the rise of cyber crimes, we might think that we all should be worried.  We might think ...

Migration to the Cloud: Yes or No?
By: Sasha Radenovic
July 20, 2017

How to move the company's information system into the cloud: On the one hand, you hear that "everyone" is working, and on the other hand, you get stories about the big expenses of something that should actually save you money. It only remains to precisely assess your needs and move forward, step by step. Cloud is expanding and ...

Recon-ng: The Advanced Open-Source Recon Framework
By: Jawady Muhammad Habib
July 19, 2017

  Information Gathering – Intro Gathering information AKA reconnaissance phase is the first step when conducting a penetration testing operation. Actually, it is the most time-consuming phase of the overall work by gathering information about a given target. This will be the intro to a series of episodes (articles) which will cover some IG tools dedicated ...

Hands-On Social Engineering Tutorial: Whaling
By: Jawady Muhammad Habib
July 19, 2017

Hello, Cyber Security enthusiasts to another article in s3curi7y.tn. Today, we will talk about whaling and some of the techniques an attacker may use. We will cover the implementation of several commonly used effective methods of social engineering (SE) in phishing CEOs. This is known as 'whaling'. ...

Next Generations of Firewalls
By: Sasha Radenovic
July 18, 2017

§          Purpose of Firewall The firewall should prevent unwanted traffic, block "downtime" on the local network and protect the computers in it. As long as the applications used strictly defined ports and protocols, it was also possible using conventional firewall devices that block traffic on a particular port and/or ...

Your Complete Guide to Splunk
By: Olivia
July 18, 2017

According to research by Northeastern University, “The total amount of data in the world was 4.4 zettabytes in 2013. That is set to rise steeply to 44 zettabytes by 2020. To put that in perspective, one zettabyte is equivalent to 44  trillion  gigabytes.”I’ve emphasized in my recent post about SQL vs Oracle Databases the importance data has ...

Social Engineering: Human Buffer Overflow Attack Overview
By: thehhonestpirate
July 18, 2017

A Human Buffer Overflow attack is a concept that is almost unbelievable. When I first learned about the concept of a human buffer overflow attack, I couldn’t believe what I was reading. I was captivated by the concept and decided to study further into the roots of the human buffer overflow and why it works. I recently talked ...

What You Need to Adopt an Intelligence Driven SOC
By: pankaj1251
July 17, 2017

In the last three years, the proliferation in the growth of active threat actors such as polymorphic attacks and availability of sophisticated hacking tool has rapidly impacted the security posture and expenditure of any size organization. The driving factor for adoption of the next generation SOC is a constantly changing environment, adopting a more cloud-centric approach, and adopting the Internet ...

How to Pass the CISSP Exam on the First Attempt
By: Mayur Pahwa CISSP SSCP
July 16, 2017

You may read multiple posts on the various blogs and websites where you are given tips as to how to pass the exam on the first go and where the authors refer books and answer questions. In this blog post, I’m not going to bombard you with those details. Instead, I’m going to share my journey and experience ...

Understanding Ransomware Recovery Tool
By: virat8586
July 15, 2017

Got hit by Ransomware Virus and all your files have been encrypted?Don't Panic as this Ransomware Recovery Tool is your solution. With unlimited technological advancements and platter of applications for us, there are hackers who are sitting behind doors and working day & night to hack your system files. Sometimes they use it to ask for ...