0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Visibility is the New Stealth!
By: Muhammad Ali Hassan
January 15, 2017

Estimated reading time: 1 minute As technology advances so is the surveillance and invasion of our privacy.For a few decades, tech giants, people, human rights activists, and several other groups have been trying to come up with a way to avoid or block surveillance and hence there are a number of inventions to handle that matter.However, the ...

Admin Arsenal - A Godsend for Small and Medium Sized Businesses
By: Tatianna
January 14, 2017

Estimated reading time: 3 minutes If you work for a small or medium sized business I can assure you that finding a reliable and cost-effective systems management solution is no easy task. If working as a Cyber Security Analyst has taught me one thing, it is that you can only protect what is visible and known. If ...

Cybrary Mobile Apps: iOS and Android Now Available
By: Tatianna
January 13, 2017

You heard right! We finally have an app for iOS. Yes, the long awaited and severely overdue iOS app is now more than a dream. And, for those of you who use Android, we didn't forget about you. We created an all-new app for android to match 1 for 1 the iOS app. Don't worry though if you have ...

Social Engineering Toolkit for OS X
By: RoninSmurf
January 13, 2017

Estimated reading time: 1 minute This is a very quick guide for installing the Social Engineering Toolkit (or SET) onto an OS X machine. This is also going to be the first in a series of hacking related articles. What is SET? The Social Engineering Toolkit is a software tool that is ...

UNM4SK3D: Ukraine, Altaba, and St. Jude
By: Olivia
January 13, 2017

#hacked (again). Someone's flexing their cyber muscles. It appears as though the recent attack on a Ukrainian transmission facility points to a person or group using the country as a trial for refining attacks on critical infrastructure that could be used across the world. Because practice makes perfect, right? The first attack against ...

Non-Certified Unethical Hacker - Challenge 1
By: Priyank Gada
January 13, 2017

What is a Non-Certified Unethical Hacker?I was chatting with my friend who has done CEH, ECSA, CHFI, and others. He told me that certifications are important. I have not done any certifications but I have learned so much from websites like Cybrary, YouTube, etc. So, he challenged me to complete some challenges (This challenge comes in some high-profile certifications that ...

Demand for Cybersecurity Pros Will Explode in 2017
By: rcubed
January 12, 2017

A topic we hammer on often and hard here at Cybrary.it is the critical shortage of Cybersecurity professionals and the growing demand for them. Guess what? Things haven’t changed and the shortage and corresponding demand only continue to increase at a rapid clip during 2017 and beyond. We could probably make the same post week after week with a ...

2017 Cyber Security Trends
By: S-Connect
January 12, 2017

Estimated reading time: 4 minutes Since 2016 has ended, multiple industries commence on fine-tuning their business strategies for 2017. Cyber criminals are making exactly the same strategies so they can work smarter. Criminals are getting smarter by exploring new practices, building organizations, bringing human expertise for more sophisticated and specialized ...

Cyber Threat Intelligence - Where Do You Get Yours?
By: deleriumendless
January 12, 2017

Estimated reading time: 2.5 minutes Recently I did some work on a new Cyber Threat Intelligence project. The Cyber Threat Intelligence aggregation and analysis trend has been growing for a while, and there are a lot of brilliant people out there brainstorming and putting together the info. They've been experimenting to see what works and what ...

Your Girlfriend Has Already Adopted the Zero Trust Model: Here’s Why you Should Too
By: Olivia
January 11, 2017

“Never trust, always verify” is shifting from the adage of crazy girlfriends everywhere to the motto of cyber security experts across the globe.The Zero Trust Model of cyber security is one that focuses on the belief that both internal and external networks cannot be trusted.  A term originally coined by Forrester Research, "Zero Trust," is a data-centric network design. It ...