0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
![[PODCAST] Minicast Episode 8 The one about ransom and privacy](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Hey hey everyone we've published another podcast this month. On this episode we talk about Microsoft's new privacy dashboard, and a lot of ransom happening in the cyber world. You can listen to our podcast on CyDefe.com, watch our raw video at https://www.twitch.tv/cydefe. Story Links https://www.securityweek.com/microsoft-launches-privacy-dashboard http://thehackernews.com/2017/01/mongodb-database-security.html?m=1 ...


When we talk about cybersecurity, for the most part, we are talking about the protection of systems and information from threat vectors such as: cyber espionage, cyber warfare, cyber terrorism, cyber negligence (looking at you Sony). In their most troublesome form, these threats take aim or point at military, secret, political, or infrastructure assets of a country and its people. ...


A lot of effort goes towards securing networks and the resources they host, but when it comes to the seven layers of the ISO OSI stack, it’s the application layer where a lot of the trouble begins and ends. Gartner places 90% of the blame for security vulnerabilities on the tippy-top layer (7). This highly-vulnerable top layer ...


Estimated reading time: 2.5 minutes IT security threats are constantly evolving. Criminals create new threats and new ways to bypass security as soon as IT professionals learn about current ones. Â As infrastructures are hardened with new technology, criminals find that it easier to manipulate end users to do their work. Ransomware attacks have taken advantage of ...


Estimated reading time: 3.5 minutes Information Security is the way to ensure the confidentiality, integrity, and availability of information within an organization. Confidentiality, the information has been protected from authorized entity. Integrity, the information had been protected from unauthorized modification. Availability, the information is there when require accessing by authorizing users. To obtain the ...


Estimated reading time: 1.5 minutes Hello everyone,  Many experts say that nothing is secure. I agreed, but if one is a programmer as well as a security expert, then we can make ...


327 new threats every minute. More than 5 every second. That’s the state of the world’s threat landscape according to Avecto. As you can probably guess, the challenge for organizations and their dedicated cyber security teams lies within the sheer volume of threats and being able to keep up with those threats.According to the Ponemon Cost of Malware Containment report, ...


Back in the old days (pre-internet), writing research papers for school was an arduous task. The process began with badgering my poor mother into dropping me off at the public library and then returning several hours later to retrieve me. My badgering was often at a fevered pitch since I’d usually wait until the day before the ...


Estimated reading time: 4 minutes It's time to get into gear for 2017. One of the most important aspects of being a security professional is staying up to date with trends, best practices, and current events. News websites and other social media websites are great ways to keep up, but people often forget the value that podcasts ...


Estimated reading time: 2 minutes Hello everyone,I am new on 0P3N, but I love contributing to the community.Let’s dive into the topic! How can we protect our online privacy through internet browsers with simple plugins and search engine settings?Here’s where it gets good ;) Firefox/Chrome/Opera HTTPS Everywhere: This plugin is created by ...