0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

UNM4SK3D: Ukraine, Altaba, and St. Jude
By: Olivia
January 13, 2017

#hacked (again). Someone's flexing their cyber muscles. It appears as though the recent attack on a Ukrainian transmission facility points to a person or group using the country as a trial for refining attacks on critical infrastructure that could be used across the world. Because practice makes perfect, right? The first attack against ...

Non-Certified Unethical Hacker - Challenge 1
By: Priyank Gada
January 13, 2017

What is a Non-Certified Unethical Hacker?I was chatting with my friend who has done CEH, ECSA, CHFI, and others. He told me that certifications are important. I have not done any certifications but I have learned so much from websites like Cybrary, YouTube, etc. So, he challenged me to complete some challenges (This challenge comes in some high-profile certifications that ...

Demand for Cybersecurity Pros Will Explode in 2017
By: rcubed
January 12, 2017

A topic we hammer on often and hard here at Cybrary.it is the critical shortage of Cybersecurity professionals and the growing demand for them. Guess what? Things haven’t changed and the shortage and corresponding demand only continue to increase at a rapid clip during 2017 and beyond. We could probably make the same post week after week with a ...

2017 Cyber Security Trends
By: S-Connect
January 12, 2017

Estimated reading time: 4 minutes Since 2016 has ended, multiple industries commence on fine-tuning their business strategies for 2017. Cyber criminals are making exactly the same strategies so they can work smarter. Criminals are getting smarter by exploring new practices, building organizations, bringing human expertise for more sophisticated and specialized ...

Cyber Threat Intelligence - Where Do You Get Yours?
By: deleriumendless
January 12, 2017

Estimated reading time: 2.5 minutes Recently I did some work on a new Cyber Threat Intelligence project. The Cyber Threat Intelligence aggregation and analysis trend has been growing for a while, and there are a lot of brilliant people out there brainstorming and putting together the info. They've been experimenting to see what works and what ...

Your Girlfriend Has Already Adopted the Zero Trust Model: Here’s Why you Should Too
By: Olivia
January 11, 2017

“Never trust, always verify” is shifting from the adage of crazy girlfriends everywhere to the motto of cyber security experts across the globe.The Zero Trust Model of cyber security is one that focuses on the belief that both internal and external networks cannot be trusted.  A term originally coined by Forrester Research, "Zero Trust," is a data-centric network design. It ...

A Tribute to Tech that Died in 2016
By: Shivam Goswami
January 11, 2017

2016 proved to be a natural calamity for technology, taking the lives of numerous tech foundations. This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License . The following ...

USB Killers on the Loose
By: intr00d
January 11, 2017

Estimated reading time: 1.5 minutes Some of you may have heard of something called  USB Killers - but what are they, and what do they do?They are intended to be malicious - potentially fatal for the motherboard and more than capable of destroying USB ports, hubs and controller boards.They are a clever concept. USB Killers take the ...

Call Me, Beep Me if You Wanna Reach Me (And Steal My Data): Malvertising in the Mobile Device Landscape
By: Olivia
January 10, 2017

Awhile back I had made a prediction in the blog ‘Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications’ that mobile applications will become hacker’s target of choice in 2017.I decided based on some further research that it is not just mobile applications that are at risk, but mobile devices in their ...

Online Shopping and Review Sites: Getting more bang for your buck
By: rcubed
January 10, 2017

The writing has been on the wall for a while now for brick and mortar retailers. Growing pressure from online shopping sites has been taking big chunks out of their revenue year-over-year. Stalwarts of the department store industry have either gone out of business or drastically cut back on the number of stores they operate. Macy’s ...