0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


This post was reviewed/updated February 2019. Today, October 4, 2017, an updated version of the CompTIA Security+ exam was released primarily to partners, courseware developers, and instructors. The new code for this exam is SY0-501.That being said, CompTIA indicates that they will start their public marketing effort and release the exam to the public ...


Traditional cloud infrastructure is typically made up of virtual machines (VMs) running on top of a hypervisor. The hypervisor isolates the VMs (which share the same CPUs) then captures I/O from each VM to ensure they are abstracted from the hardware. The VM is therefore secure and portable as it sees only a software-defined NIC (network interface card). The ...


What is a CISO? A CISO is the information security officer of an organization, who must tell organizations to create security policies, manage those policies, information, assets, and risks associated with them, and create security programs and awareness plans. What is the profile of a CISO? There is not one ...


It’s October at last and time to celebrate- not the release of pumpkin spice lattes or the fact that Halloween is around the corner, but National Cyber Security Awareness Month! This annual campaign is meant to raise awareness about the importance of cyber security (as if the numerous breaches in recent months weren’t enough).National Cyber Security Awareness ...


You've carried out a vulnerability scan of your organization and now how a report totaling possibly thousands of pages, listing hundreds of vulnerabilities over multiple devices. Chances are, adding to the problem will likely be the total lack of resources to be able to deal this in anything but an ad-hoc manner (one-player, whack-a-mole scenario). Not all vulnerabilities are ...


By @theBenygreen Hello, Readers :-) This is the Part 3 of our tutorial on BeEF and Armitage/Cobaltstrike Integration: (Build botnet of browsers by using malicious extensions). Now that you are familiar with BeEF and the Armitage/Cobaltstrike integration by using Beefstrike, it's time to introduce a major limitation and how to overcome it. ...


#hacked Someone (or many groups of someones) has it out for US businesses. Another week and another breach in big business for the country. It was announced that 'Big Four' firm Deloitte is the latest to fall victim. You may know Deloitte as one of the largest private accounting firms in the U.S. which ...


Truth: we all want to achieve our goals quickly and effectively! If you're working, striving to earn your cybersecurity certs and want to have a life, you might need a little support in accomplishing your certification goals with greater speed. Here's some good news: the Cybrary platform and community not only supports your cybersecurity training needs, they can also help ...


Have you ever wanted to get your hands on the latest game, only to find that the Google Play thought it wasn't compatible with your phone? I know, it's a real bummer. Maybe you don't have a Snapdragon device, but you're pretty sure an old device could still handle it. What if the app is not available in your ...


Are you failing to measure cybersecurity effectiveness? Well, now you can find out with the State of Cyber Security Metrics Annual Report 2017 . Exploring the shameful state of cybersecurity metrics, failures in planning and performance, the lack of resources cited as a major hurdle and how small business are especially vulnerable; This report provides ...