0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Updated Security+ Exam: SY0-501
By: Olivia
October 4, 2017

This post was reviewed/updated February 2019. Today, October 4, 2017, an updated version of the CompTIA Security+ exam was released primarily to partners, courseware developers, and instructors. The new code for this exam is SY0-501.That being said, CompTIA indicates that they will start their public marketing effort and release the exam to the public ...

Oracle's Next Generation Cloud Infrastructure
By: John Greene
October 4, 2017

Traditional cloud infrastructure is typically made up of virtual machines (VMs) running on top of a hypervisor. The hypervisor isolates the VMs (which share the same CPUs) then captures I/O from each VM to ensure they are abstracted from the hardware. The VM is therefore secure and portable as it sees only a software-defined NIC (network interface card). The ...

Being a CISO: A Bird's-Eye View
By: Sebastián Vargas
October 4, 2017

What is a CISO? A CISO is the information security officer of an organization, who must tell organizations to create security policies, manage those policies, information, assets, and risks associated with them, and create security programs and awareness plans. What is the profile of a CISO? There is not one ...

Celebrating National Cyber Security Awareness Month
By: Olivia
October 1, 2017

  It’s October at last and time to celebrate- not the release of pumpkin spice lattes or the fact that Halloween is around the corner, but National Cyber Security Awareness Month! This annual campaign is meant to raise awareness about the importance of cyber security (as if the numerous breaches in recent months weren’t enough).National Cyber Security Awareness ...

Some Thoughts on Vulnerability Management
By: g6sh
September 30, 2017

You've carried out a vulnerability scan of your organization and now how a report totaling possibly thousands of pages, listing hundreds of vulnerabilities over multiple devices. Chances are, adding to the problem will likely be the total lack of resources to be able to deal this in anything but an ad-hoc manner (one-player, whack-a-mole scenario). Not all vulnerabilities are ...

Tutorial: BeEF and Armitage/Cobaltstrike Integration – Part 03
By: ben
September 30, 2017

By  @theBenygreen Hello, Readers :-) This is the Part 3 of our tutorial on BeEF and Armitage/Cobaltstrike Integration: (Build botnet of browsers by using malicious extensions). Now that you are familiar with BeEF and the Armitage/Cobaltstrike integration by using Beefstrike, it's time to introduce a major limitation and how to overcome it. ...

UNM4SK3D: Deloitte, Cardiac Scan, and SVR Tracking
By: Olivia
September 29, 2017

#hacked Someone (or many groups of someones) has it out for US businesses. Another week and another breach in big business for the country. It was announced that 'Big Four' firm Deloitte is the latest to fall victim.  You may know Deloitte as one of the largest private accounting firms in the U.S. which ...

Earn Your Cybersecurity Certifications Faster
By: ginasilvertree
September 28, 2017

Truth: we all want to achieve our goals quickly and effectively! If you're working, striving to earn your cybersecurity certs and want to have a life, you might need a little support in accomplishing your certification goals with greater speed. Here's some good news: the Cybrary platform and community not only supports your cybersecurity training needs, they can also help ...

APK Downloader for Your PC
By: shahpar
September 28, 2017

Have you ever wanted to get your hands on the latest game, only to find that the Google Play thought it wasn't compatible with your phone? I know, it's a real bummer. Maybe you don't have a Snapdragon device, but you're pretty sure an old device could still handle it. What if the app is not available in your ...

Failing to Measure Cybersecurity Effectiveness?
By: Samantha Voss
September 28, 2017

Are you failing to measure cybersecurity effectiveness? Well, now you can find out with the State of Cyber Security Metrics Annual Report 2017 .  Exploring the shameful state of cybersecurity metrics, failures in planning and performance, the lack of resources cited as a major hurdle and how small business are especially vulnerable; This report provides ...