0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


JavaScript is the most commonly used programming language on a global scale. Even Back-End developers are more likely to use it than any other language. A survey from Stack Overflow revealed that 90.5% of developers know JavaScript.What makes these development skills so valuable? For starters, front-end developers make an average of $75,563 in the US, according to Glassdoor ...


Shadow Brokers is a hacker group which has leaked several NSA hacking tools and scripts to the public. Firstly when they got hands on NSA tools they tried to auction it in the black market ranging from 2 to 200 Bitcoins, but the auction failed and they leaked all the dump in public on Github. ...


You may not be surprised to know that women only make up 11% of cybersecurity workers globally, according to an ISC2 report. This staggering underrepresentation is reflective across all STEM careers, a fact that is only adding to the skills gap in the technology industry.Many women who are in the field, such as Magda CHELLY , Cybrary SME, Cyber Feminist ...


According to research, there are now more than 1.5 million SharePoint developers who are active in Sharepoint development. In addition to this, there are more than 1 million SharePoint professionals and experts who specialize in devising solutions and performing management and maintenance of SharePoint systems.That being said, the need for additional professionals who specialize in developing and managing ...

After a recent event of an NSA contractor being tracked down via hidden codes on a leaked document, I was interested in learning more about these tracking codes, and how they work. Back in the 90's, manufacturers of color laser printers came together with the government to implement a hidden tracking code within their printers. This was to help ...


#malware On Tuesday, news of a 'NotPetya' ransomware attack which targeted several countries, including Russia, Ukraine, France, India and the United States, demanding $300 in ransom spread like wildfire as fears of 'another WannaCry' hit. Now, just a few days later, and after much analysis, this 'ransomware' is actually said to be a ...


Recently, I read an article that described millennial’s lack of interest in pursuing cyber security careers. While the author suggested this was related to unawareness, he stated it posed a greater threat to the cyber security skills gap as older infosec workers retire. The skills gap is a topic we will never cease to talk about, and an ...


Recently, I completed a course through MIT Professional Education in Cybersecurity. During the course, we discussed many concepts, best practices, and policies in the field of cyber security. We also discussed the research being performed at MIT in the area of cybersecurity. One of the concepts that stood out was that of Fully Homomorphic Encryption. Fully Homomorphic ...


Since its’ inception, Linux has become a phenomenon in the IT world as programmers work to enhance the operating system. As it grows, Linux has gained a following among developers very quickly, as it appeals to a wide audience. Most specifically, Linux is ideal for those who know UNIX and want to run it on PC-type hardware, those ...


MindReader was supposedly one of the easiest challenges at GoogleCTF and it’s after some guessing. So let’s start! First heading the challenge page we see a box with “read” button. First thing comes to mind is to try to test for “XSS” so a couple of XSS attempts were tested among them the following: <script>alert(test)</script> ...