0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


What is a CISO? A CISO is the information security officer of an organization, who must tell organizations to create security policies, manage those policies, information, assets, and risks associated with them, and create security programs and awareness plans. What is the profile of a CISO? There is not one ...


It’s October at last and time to celebrate- not the release of pumpkin spice lattes or the fact that Halloween is around the corner, but National Cyber Security Awareness Month! This annual campaign is meant to raise awareness about the importance of cyber security (as if the numerous breaches in recent months weren’t enough).National Cyber Security Awareness ...


You've carried out a vulnerability scan of your organization and now how a report totaling possibly thousands of pages, listing hundreds of vulnerabilities over multiple devices. Chances are, adding to the problem will likely be the total lack of resources to be able to deal this in anything but an ad-hoc manner (one-player, whack-a-mole scenario). Not all vulnerabilities are ...


By @theBenygreen Hello, Readers :-) This is the Part 3 of our tutorial on BeEF and Armitage/Cobaltstrike Integration: (Build botnet of browsers by using malicious extensions). Now that you are familiar with BeEF and the Armitage/Cobaltstrike integration by using Beefstrike, it's time to introduce a major limitation and how to overcome it. ...


#hacked Someone (or many groups of someones) has it out for US businesses. Another week and another breach in big business for the country. It was announced that 'Big Four' firm Deloitte is the latest to fall victim. You may know Deloitte as one of the largest private accounting firms in the U.S. which ...


Truth: we all want to achieve our goals quickly and effectively! If you're working, striving to earn your cybersecurity certs and want to have a life, you might need a little support in accomplishing your certification goals with greater speed. Here's some good news: the Cybrary platform and community not only supports your cybersecurity training needs, they can also help ...


Have you ever wanted to get your hands on the latest game, only to find that the Google Play thought it wasn't compatible with your phone? I know, it's a real bummer. Maybe you don't have a Snapdragon device, but you're pretty sure an old device could still handle it. What if the app is not available in your ...


Are you failing to measure cybersecurity effectiveness? Well, now you can find out with the State of Cyber Security Metrics Annual Report 2017 . Exploring the shameful state of cybersecurity metrics, failures in planning and performance, the lack of resources cited as a major hurdle and how small business are especially vulnerable; This report provides ...


By @theBenygreen In information security, when we talk about external attacks, you will realize that the browsers are generally called in contribution. It’s simple: browsers are a good entry door and even with no 0day exploits on hand, you can even get a shell . For a pentester, it is a good skill to know how to ...


Hi, everybody. I'm @thebenygreen, and I will introduce you to one of my codes, Beefstrike.BeefStrike is a Cortana script for BeEF integration inside the Armitage ( a Metasploit GUI) . The result is the ability to use client-side exploits like remote exploits and automate BeEF command execution after hooking. One of the great power of Armitage is his ability ...