0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

All You Need to Know about WannaCry Ransomware
By: Apurv Singh Gautam
July 3, 2017

Shadow Brokers is a hacker group which has leaked several NSA hacking tools and scripts to the public. Firstly when they got hands on NSA tools they tried to auction it in the black market ranging from 2 to 200 Bitcoins, but the auction failed and they leaked all the dump in public on Github. ...

Women in Tech: Girl Scouts to Provide Cyber Security Badges
By: Olivia
July 2, 2017

You may not be surprised to know that women only make up 11% of cybersecurity workers globally, according to an ISC2 report. This staggering underrepresentation is reflective across all STEM careers, a fact that is only adding to the skills gap in the technology industry.Many women who are in the field, such as Magda CHELLY , Cybrary SME, Cyber Feminist ...

Your Complete Guide to Microsoft SharePoint
By: Olivia
July 1, 2017

According to research, there are now more than 1.5 million SharePoint developers who are active in Sharepoint development. In addition to this, there are more than 1 million SharePoint professionals and experts who specialize in devising solutions and performing management and maintenance of SharePoint systems.That being said, the need for additional professionals who specialize in developing and managing ...

Printer Steganography
By: mawright
July 1, 2017

After a recent event of an NSA contractor being tracked down via hidden codes on a leaked document, I was interested in learning more about these tracking codes, and how they work. Back in the 90's, manufacturers of color laser printers came together with the government to implement a hidden tracking code within their printers. This was to help ...

UNM4SK3D: Petya, CIA, and Google
By: Olivia
June 30, 2017

#malware On Tuesday, news of a 'NotPetya' ransomware attack which targeted several countries, including Russia, Ukraine, France, India and the United States, demanding $300 in ransom spread like wildfire as fears of 'another WannaCry' hit. Now, just a few days later, and after much analysis, this 'ransomware' is actually said to be a ...

Military Veterans: Why Cyber Security is The Ideal Career
By: Olivia
June 29, 2017

Recently, I read an article that described millennial’s lack of interest in pursuing cyber security careers. While the author suggested this was related to unawareness, he stated it posed a greater threat to the cyber security skills gap as older infosec workers retire. The skills gap is a topic we will never cease to talk about, and an ...

A Brief Introduction to Fully Homomorphic Cryptosystems
By: Lawrence King
June 28, 2017

Recently, I completed a course through MIT Professional Education in Cybersecurity. During the course, we discussed many concepts, best practices, and policies in the field of cyber security. We also discussed the research being performed at MIT in the area of cybersecurity. One of the concepts that stood out was that of Fully Homomorphic Encryption. Fully Homomorphic ...

Your Complete Guide to Linux
By: Olivia
June 28, 2017

Since its’ inception, Linux has become a phenomenon in the IT world as programmers work to enhance the operating system. As it grows, Linux has gained a following among developers very quickly, as it appeals to a wide audience. Most specifically, Linux is ideal for those who know UNIX and want to run it on PC-type hardware, those ...

Google CTF 2017 Mind Reader Write-up
By: Motasem
June 28, 2017

MindReader was supposedly one of the easiest challenges at GoogleCTF and it’s after some guessing. So let’s start! First heading the challenge page we see a box with “read” button. First thing comes to mind is to try to test for “XSS” so a couple of XSS attempts were tested among them the following: <script>alert(test)</script> ...

PST Recovery Tool - Free Full Version
By: elbert04
June 27, 2017

Corrupt PST File Recovery Freeware can be used to fix unreadable PST file and return emails from dishonest PST file of Outlook (2016 to 97) applications. PST File Recovery also fixes oversized PST files and returns emails successfully from them. Corrupt PST File Recovery Freeware is an opportune PST Recovery software, which recovers the Augean, unreadable or ...