0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Endless Scourge of Malicious Email
By: purvikshah
June 14, 2019

This blog originally appeared on the Cisco Security blog . Reposted with permission. There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent . Plus, according to Verizon’s 2018 Data Breach Investigations ...

Will Cyber Security along with Data Science Revolutionize the Technology Arena?
By: Tapan Jatakia
June 13, 2019

What is Data Science? 'The Amalgamation of AI+ML+Big_Data' would be the sweetest and shortest answer. Formal Definitions: The application of tools, techniques, and methodologies of domains such as algorithms, machine learning, big data, and artificial intelligence in a systematic, disciplined and quantifiable manner which ultimately leads to Scientific and Engineered approaches to Data ...

Nmap Ndiff and Telegram for red teaming
By: TYEB
June 13, 2019

What is Phactive? Phactive is a little script written in bash, it’s to aid in a red team workflow, Since red team is mostly about continuous monitoring and simulation of a real life attack. unlike in Penetration testing where you just have to run a scan and submit a report the explain ...

Incident Response Lifecycle to deal with Security Incident
By: kunalgupta007
June 12, 2019

Now days we are dealing with lots of Security Incidents (which is Violation of Security Policy) and to deal with them we must follow some guidelines to address such security incident, here we will discuss Incident Response lifecycle that we (I am a Incident Handler) follow. You will have idea about what do we do in an overview perspective ...

How to Deploy a NodeJS App to Kubernetes
By: limor2019
June 12, 2019

If you’re one of the few who haven’t yet tried out container orchestration, you might be new to the Kubernetes architecture . “Kubernetes is a portable, extensible open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation.” Kubernetes, also popularly ...

How to Ensure Application Security in DevOps: 5 Best Practices
By: giladmaayan
June 12, 2019

The DevOps methodology empowers development and operations teams to collaborate rather than conflict with each other. Some of the benefits realized from a DevOps approach include more frequent software releases, shorter time to market, and fewer application failures in production.Despite these benefits, the focus on rapid development and compressed development cycles in DevOps acts as a barrier to ...

Open Source Security Risks and Vulnerabilities You Should Know
By: eddiesegal
June 12, 2019

Open Source Software (OSS) components are essential for most applications today, often making up more than 50% of the codebase. Many organizations struggle to implement the appropriate security measures to protect against open source vulnerabilities. Once a vulnerability is fixed, another one pops up, and open source security can often seem like a losing game.This article explains the dangers ...

Behind the Scenes: Endpoint Protection in the Cloud
By: purvikshah
June 7, 2019

This post originally appeared on "The Lockdown" , Thycotics Cyber Security Publication The cloud has certainly been a game changer, driving innovation and growth. Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these ...

Office 365 phishing
By: purvikshah
May 31, 2019

Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat out cannot send or receive—the list goes on.It’s no wonder that email-hosting services like Office 365 have become so popular. Such cloud-based email services remove a lot of the ...

Get to Know Your Instructor: Gabrielle Hempel
By: SLWelty
May 21, 2019

onethird] [/onethird Fun Facts About Gabrielle! What course do you teach? Introduction to SIEM Tools What is an interesting fact about you? I’m 6’0” and the shortest in my family! Your favorite food? Sushi, ...