0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


The effects of poor patch management were brought to the fore with the global ransomware attack that affected over 150 countries and scores of organizations in the second quarter of 2017. The ransomware exploited a vulnerability in windows operating system. In all fairness to Microsoft, the operating system OEM, a patch to address this vulnerability had ...


#wikileaks As expected, Wikileaks has added yet another leak to the Vault 7 collection, one that leaves Harry Potter fans speculating. This time, rather than being a hacking tool or surveillance method focused leak, this project focuses on a Missile Control System, complete with blueprints. 'Project Protego' as it's called, is a PIC-based missile ...


Here are some more tools to explore Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I am happy to help you so feel free to contact me anytime. 1) Copernic Tracker Link: ...


Cyber Security/IT salaries continue to rise as companies deal with a snowballing shortage of cyber talent. A lucrative career indeed Over a decade ago, career options for technology seeker s were generally limited to security firms, handfuls of jobs inside mainstream companies, and in government agencies. Today, as technology becomes more and more incorporated ...


Corruption Issues in Outlook PST MS Outlook, when used as a desktop email client, stores its data in Outlook data files (PST). Though a convenient format for saving and transferring data, Outlook PST files may get corrupted due to many reasons. We have categorized them into two main categories. Hardware Related Issues ...


The work that you perform offline in Microsoft Outlook is saved in a folder called Offline Storage Table or OST. When you try to access your offline data, the OST file is opened and the data come up. Imagine, a single fault incurs in the OST file and the OST data becomes completely inaccessible. To avoid such issues and ...


SharePoint Server Recovery tool professionally repairs corrupted database of the SharePoint server and retrieves entire documents and other objects from it. The SharePoint Recovery software allows repairs for the damaged or inaccessible database and creates a new MDF file, which can be incorporated into the SharePoint server to make the web sites accessible. Software Features Aryson SharePoint Server ...


#wikileaks Wikileaks is in the news for more reasons than 1 this week. As expected, they've added another hacking tool to the growing list of Vault 7 leaks. The latest, 'AngelFire' is a Windows hacking tool used to gain persistent remote access. But, prior to that leak, Wikileaks was hacked themselves by none ...

Very few coding activities expose us to so many exciting technologies at once - the web (HTTP/HTML/XML/CSS/JS), data mining, NLP, and security (IPS/WAF evasion) like the Web bots. Yet, with the proliferation of the automated tools and Google, this once mainstream skill is becoming either black hat only or too "old-school". None of this should be the case and ...


According to Security Magazine, Hackers attack every 39 seconds, with 1 in 3 Americans attacked this past year alone. Additionally, 62% of companies have experienced phishing social engineering attacks, making it one of the top three cyberthreat concerns for 2016. What is social engineering? Social engineering is a method that depends on human ...