0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

2017 Cyber Security Trends
By: S-Connect
January 12, 2017

Estimated reading time: 4 minutes Since 2016 has ended, multiple industries commence on fine-tuning their business strategies for 2017. Cyber criminals are making exactly the same strategies so they can work smarter. Criminals are getting smarter by exploring new practices, building organizations, bringing human expertise for more sophisticated and specialized ...

Cyber Threat Intelligence - Where Do You Get Yours?
By: deleriumendless
January 12, 2017

Estimated reading time: 2.5 minutes Recently I did some work on a new Cyber Threat Intelligence project. The Cyber Threat Intelligence aggregation and analysis trend has been growing for a while, and there are a lot of brilliant people out there brainstorming and putting together the info. They've been experimenting to see what works and what ...

Your Girlfriend Has Already Adopted the Zero Trust Model: Here’s Why you Should Too
By: Olivia
January 11, 2017

“Never trust, always verify” is shifting from the adage of crazy girlfriends everywhere to the motto of cyber security experts across the globe.The Zero Trust Model of cyber security is one that focuses on the belief that both internal and external networks cannot be trusted.  A term originally coined by Forrester Research, "Zero Trust," is a data-centric network design. It ...

A Tribute to Tech that Died in 2016
By: Shivam Goswami
January 11, 2017

2016 proved to be a natural calamity for technology, taking the lives of numerous tech foundations. This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License . The following ...

USB Killers on the Loose
By: intr00d
January 11, 2017

Estimated reading time: 1.5 minutes Some of you may have heard of something called  USB Killers - but what are they, and what do they do?They are intended to be malicious - potentially fatal for the motherboard and more than capable of destroying USB ports, hubs and controller boards.They are a clever concept. USB Killers take the ...

Call Me, Beep Me if You Wanna Reach Me (And Steal My Data): Malvertising in the Mobile Device Landscape
By: Olivia
January 10, 2017

Awhile back I had made a prediction in the blog ‘Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications’ that mobile applications will become hacker’s target of choice in 2017.I decided based on some further research that it is not just mobile applications that are at risk, but mobile devices in their ...

Online Shopping and Review Sites: Getting more bang for your buck
By: rcubed
January 10, 2017

The writing has been on the wall for a while now for brick and mortar retailers. Growing pressure from online shopping sites has been taking big chunks out of their revenue year-over-year. Stalwarts of the department store industry have either gone out of business or drastically cut back on the number of stores they operate. Macy’s ...

Top 5 Highest Paying Cyber Security Certifications for 2017
By: jrinehard
January 10, 2017

In the world of cyber security, there are many certifications that will boost your career along with the lucrative financial compensations that go along with it in return for protecting our nation’s computer networks from cyber-attacks.These 5 cyber security certifications can command a six-figure salary: CISM(CERTIFIED INFORMATION SECURITY MANAGER) Skills Gained Ability to quickly ...

Using Websploit to Resolve Http Proxy Protected Websites
By: baphomet1488
January 10, 2017

Http proxy protection is a commonly used protection method that will mask a hosts location through the use of intermediary servers. The application Websploit has a very powerful tool that will help a penetration tester resolve an Http proxy protected website into host locations. This is the Cloudflare resolver. While this tool is seemingly specific to Cloudflare ...

How Hardware Knowledge Aids in Security & Hacking
By: Romansh Yadav
January 9, 2017

How does knowledge of computer hardware help us in security and/or hacking? Well, this is a very popular question people ask on Quora. First, I want to share a piece of advice: be patient and persevere. Learning ethical hacking is going to take more than one day or one month, it takes year - or longer - filled with ...