0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


#hacked (again). Someone's flexing their cyber muscles. It appears as though the recent attack on a Ukrainian transmission facility points to a person or group using the country as a trial for refining attacks on critical infrastructure that could be used across the world. Because practice makes perfect, right? The first attack against ...


What is a Non-Certified Unethical Hacker?I was chatting with my friend who has done CEH, ECSA, CHFI, and others. He told me that certifications are important. I have not done any certifications but I have learned so much from websites like Cybrary, YouTube, etc. So, he challenged me to complete some challenges (This challenge comes in some high-profile certifications that ...


A topic we hammer on often and hard here at Cybrary.it is the critical shortage of Cybersecurity professionals and the growing demand for them. Guess what? Things haven’t changed and the shortage and corresponding demand only continue to increase at a rapid clip during 2017 and beyond. We could probably make the same post week after week with a ...


Estimated reading time: 4 minutes Since 2016 has ended, multiple industries commence on fine-tuning their business strategies for 2017. Cyber criminals are making exactly the same strategies so they can work smarter. Criminals are getting smarter by exploring new practices, building organizations, bringing human expertise for more sophisticated and specialized ...


Estimated reading time: 2.5 minutes Recently I did some work on a new Cyber Threat Intelligence project. The Cyber Threat Intelligence aggregation and analysis trend has been growing for a while, and there are a lot of brilliant people out there brainstorming and putting together the info. They've been experimenting to see what works and what ...


“Never trust, always verify” is shifting from the adage of crazy girlfriends everywhere to the motto of cyber security experts across the globe.The Zero Trust Model of cyber security is one that focuses on the belief that both internal and external networks cannot be trusted. A term originally coined by Forrester Research, "Zero Trust," is a data-centric network design. It ...


2016 proved to be a natural calamity for technology, taking the lives of numerous tech foundations. This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License . The following ...


Estimated reading time: 1.5 minutes Some of you may have heard of something called USB Killers - but what are they, and what do they do?They are intended to be malicious - potentially fatal for the motherboard and more than capable of destroying USB ports, hubs and controller boards.They are a clever concept. USB Killers take the ...


Awhile back I had made a prediction in the blog ‘Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications’ that mobile applications will become hacker’s target of choice in 2017.I decided based on some further research that it is not just mobile applications that are at risk, but mobile devices in their ...


The writing has been on the wall for a while now for brick and mortar retailers. Growing pressure from online shopping sites has been taking big chunks out of their revenue year-over-year. Stalwarts of the department store industry have either gone out of business or drastically cut back on the number of stores they operate. Macy’s ...