0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Notable Malware Attacks and Security Vulnerabilities
By: Jessica
August 19, 2018

Computer and Internet technologies have gone through amazing trends and developments that have always made headlines in the news since they’ve been around over the past several decades. With the way that these technologies have made everyday tasks like household budgeting and scientific research significantly easier and faster than ever before, they are certainly newsworthy. What have also made ...

What is Firmware?
By: Jessica
August 19, 2018

Computer-savvy or not, anybody who has ever touched a computer has heard the terms “software,” “hardware,” “adware,” “spyware,” and “malware,” whether it be from the news, the Internet, or everyday conversation. There’s another type of “ware,” however, that does not seem to be as familiar to many, but it should be: firmware. Firmware Defined Firmware is a very specific ...

Hardening WordPress Like a Boss
By: Sebastián Vargas
August 18, 2018

T here is a need to begin to better protect WordPress platforms. With the huge amount of IOC, where the WordPress platforms are attacked, which I have seen closely, I created this guide for free use. If you want to collaborate with me in any endeavor, you can contact me at sebastian.vargas@protonmail.com . If you do not believe ...

Understanding Netcat, the Swiss Army Knife for Ethical Hacking
By: Dr. Michael J. Garbade
August 17, 2018

Netcat (usually abbreviated as nc) is a powerful information security tool used for reading from and writing to network connections using the TCP or UDP protocol. Usamaazad , who has more than four years of cyber security experience and currently teaches people his skills, says that “contrary to most tools, Netcat is ...

Truths & Myths — Cyber Insurance for Social Engineering Fraud
By: travissholt
August 15, 2018

I’ve heard it more frequently over the past few weeks, “cyber liability insurance doesn’t cover anything.” That statement is usually followed by a story about someone who had a cyber claim that wasn’t covered. A majority of the time, these stories involve social engineering fraud. According to  Interpol , social engineering fraud is “a broad term ...

CISM Training: Specific Use Cases
By: Tatianna
August 14, 2018

CISM Training: Specific Use Cases Data breaches are getting worse. As noted by The Spectator , recent data suggests more than 140 million records are lost or stolen every month, while worldwide losses due to attacks such as business email compromise (BEC) will top $9 billion ...

Password and Authentication Hack
By: oluwaseunmi
August 14, 2018

A password is known generally to be the secret code you input to gain access to a resource.  Authentication is the process of gaining access to a resource.  Passwords are a means of authentication.  They are usually our only means of authentication for our online accounts.  Are they hackable?  Yes, very ...

Different Angles of Cybersecurity
By: Sebastián Vargas
August 13, 2018

Here, I present some important ideas with an emphasis on understanding rather than on cybersecurity as a specialty, even though it has different categories with different bodies of knowledge, as expected. So, do you know cybersecurity? I invite you to read this lightweight article to understand the different categories that can be found in cybersecurity. For ...

What is Multi-Factor Authentication?
By: Jessica
August 12, 2018

Passwords used to be the be-all and end-all of account protection. As long as your password was long enough, unique enough, and complicated enough with a good mix of upper and lower case letters, numbers, and symbols, it was practically crack-proof. Those days, however, are long gone. That’s because hackers, unfortunately, have many methods of stealing or obtaining passwords ...

ITIL Certification: Your Path to High Paying Jobs
By: Guest Writer
August 10, 2018

The Industry & The Problem: In the dynamic and rapidly changing IT industry, if you do not upgrade your skills regularly you would soon become irrelevant to your organization, or even to the industry as a whole. There is a huge demand for many courses and certifications, but the plethora of ...