0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Reverse Engineering for Beginners: Basic Programming Concepts
By: Dra4hos7
April 5, 2019

In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is ...

What is Data Science?
By: oliviaperez
April 2, 2019

Without a doubt, data is everywhere around us and we are always putting in an effort to increase the path as the world is interacting and improving more with the internet. Most of the industries have these days come to the conclusion that all the power behind data as well as understanding how it can improve as ...

How do you create an Enterprise Password Policy that actually gets used?
By: purvikshah
March 29, 2019

Article posted courtesy of : Thycotic 1. Take the human element out of the equation whenever you can – Use a password manager that doesn’t require a user to remember their password to login to sensitive systems. 2. Remove unnecessary password rotations – I’m going to have to side with the NIST’s proposed password security policy changes coming up ...

The Hacker's Workflow
By: lowebrew
March 28, 2019

The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding of threats in the ...

Another Reluctant Hacker
By: PatAdel
March 28, 2019

As an early riser who typically starts his day around 4:45 am, it was way past my bedtime. My computer clock says 1:09 am and my eyes were still wide open with my brain exploring various paths available to me as my next step towards hacking the target box. Then I recalled how it all started and why this ...

Preventing Cybersecurity Disaster: Learning from the Top Security Breaches in 2018
By: limor2019
March 27, 2019

Looking back at 2018, it is difficult to ignore the chaos caused by the extensive incidents of data breaches that seemed to occur during each week of the year. Sensitive data and personally identifiable information of millions of individuals were exposed and made available on various platforms of the dark web for malicious users to buy and use. ...

Firewall Basic Bypassing Techniques With Nmap and Hping3
By: Uladzislau Murashka
March 27, 2019

Security of data always have in top of priorities for systems administrator’s. Systems admin’s always tries to keep all the ports close for public use which is not required. There are many  firewall  solutions available on the market starting from simple iptables and ending with complex cloud solutions. In our current case we will take a look ...

Your money or your life: Digital extortion scams
By: purvikshah
March 22, 2019

This blog originally appeared on the Cisco Security Blog. Reprinted with permission.Original Author : Ben Nahorney Link to his bio There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most ...

Top Cyber Security Threats for 2019
By: camiragano
March 21, 2019

Phishing Attacks Phishing, as in “phishing for phools”, is a cybersecurity approach that has been around for a long time. However, new defenses and security techniques have forced phishing to evolve. The proliferation of information provides attackers with new ...

The ITIL Effect: Is this certification still worth it?
By: Tatianna
March 20, 2019

Is This Service Certification Still Worth It? Certifications offer a dual benefit for IT professionals with improved career opportunities and increased compensation. Organizations also come out ahead since highly-skilled, well-trained technology staff can empower the critical transition from IT-as-cost-center to an essential aspect of business ROI. The result? More companies now demand top-tier certifications, and more IT staff recognize ...