0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
![[podcast] MITRE's ATT&CK Matrix:](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

#MITRE has a matrix that classifies the various ways that your network can be . It shows all the post-exploitation categories from 'Persistence' to 'Privilege Escalation'. It's a nice way to organize all the information.This week, Mr. Boettcher and I go over "#Persistence" and "#Command and#Control" sections of the Matrix.Every person who attacks you has a specific method that they use ...


[caption id="attachment_56334" align="aligncenter" width="1024"] Passwords are victims of neglect and the weakest links in the IT landscape[/caption] Security savvy starts here Carefully creating and handling passwords is the perfect place to become a more savvy Security Pro. It seems reasonable that by the time someone launches their security career, they'd be practicing safe password usage and deployment. Yet, many ...


Case Summary: Mrs. Poornima Rai, working as a Social Media Strategist a firm called 'Next Gen Digital System,' received an email with promotional offer attached to it. She's an intelligent person who always loved listening to music and dating books with coffee. She also has some knowledge about attacks through emails and their effect.Mrs. Pinky Sharma, CEO ...
![[podcast] Can you achieve Security Through Obscurity?](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

That's the question many think is an automatic 'yes'. Whether your httpd is running on port 82, or maybe your fancy#wordpress #module needs some cover because the code quality is just a little lower than where it should be, and you need to cover up some cruft. But maybe there are some times where things just need to be secure...This ...


"Door locks keep the good people out. The bad guys will break a window." For the life of me, I can't remember where I heard that quote, but it's an important one to remember when approaching cyber security problems.Most "preventative" security measures (the kinds of things that make us feel safe) are not ...


Globally, cyber security shortages are expected to reach upward of 1.5 million by the year 2020. As the Cybrary community reaches the 300,000 registered users mark; we found this a great opportunity to thank everyone that has contributed and continued to make this a great cyber security learning environment for people from around the world. We are proud to ...


With U.S.-supplied, highly enriched uranium Iran was able to fuel a small nuclear reactor, effectively beginning their nuclear program in the 1960’s. Though advancement of the nuclear program slowed during the Islamic revolution and Iran-Iraq war, by the middle of the 1990’s, Iran publicly pursued continuation of their nuclear program. (“Iran Sanctions”, 2010, p.1) In 2002, satellite photos verified ...


If you've read my older articles 7 Steps to Create a Defensive Security Shield for MS Windows and Ethical Hacking: How To Use Batch Programming then you might have noticed one thing: getting hacked on a Windows machine is so damn easy. I thought that I should give you guys some info on how to ...


This post is an update to my previous post about Cybrary’s Android app being banned from the Google Play store: https://www.cybrary.it/2015/11/google-play-against-cybersecurity-education-and-for-censorship-you-decide/ Thank you Cybrarians, for your support in getting the Cybrary app put back into the Google Play store! Also, thank you Google Play Support Team for hearing our appeal!As you know, last Wednesday (11/25), the Google Play Support ...


Social Engineering is one of the most terrifying aspects of trying to secure anything in any way. Unfortunately, most people lack the ability to understand they’re being engineered and act on that realization. Social engineering attacks rely on common tropes, which can easily be learned if you understand: when ...