0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Understanding Netcat, the Swiss Army Knife for Ethical Hacking
By: Dr. Michael J. Garbade
August 17, 2018

Netcat (usually abbreviated as nc) is a powerful information security tool used for reading from and writing to network connections using the TCP or UDP protocol. Usamaazad , who has more than four years of cyber security experience and currently teaches people his skills, says that “contrary to most tools, Netcat is ...

Truths & Myths — Cyber Insurance for Social Engineering Fraud
By: travissholt
August 15, 2018

I’ve heard it more frequently over the past few weeks, “cyber liability insurance doesn’t cover anything.” That statement is usually followed by a story about someone who had a cyber claim that wasn’t covered. A majority of the time, these stories involve social engineering fraud. According to  Interpol , social engineering fraud is “a broad term ...

CISM Training: Specific Use Cases
By: Tatianna
August 14, 2018

CISM Training: Specific Use Cases Data breaches are getting worse. As noted by The Spectator , recent data suggests more than 140 million records are lost or stolen every month, while worldwide losses due to attacks such as business email compromise (BEC) will top $9 billion ...

Password and Authentication Hack
By: oluwaseunmi
August 14, 2018

A password is known generally to be the secret code you input to gain access to a resource.  Authentication is the process of gaining access to a resource.  Passwords are a means of authentication.  They are usually our only means of authentication for our online accounts.  Are they hackable?  Yes, very ...

Different Angles of Cybersecurity
By: Sebastián Vargas
August 13, 2018

Here, I present some important ideas with an emphasis on understanding rather than on cybersecurity as a specialty, even though it has different categories with different bodies of knowledge, as expected. So, do you know cybersecurity? I invite you to read this lightweight article to understand the different categories that can be found in cybersecurity. For ...

What is Multi-Factor Authentication?
By: Jessica
August 12, 2018

Passwords used to be the be-all and end-all of account protection. As long as your password was long enough, unique enough, and complicated enough with a good mix of upper and lower case letters, numbers, and symbols, it was practically crack-proof. Those days, however, are long gone. That’s because hackers, unfortunately, have many methods of stealing or obtaining passwords ...

ITIL Certification: Your Path to High Paying Jobs
By: Guest Writer
August 10, 2018

The Industry & The Problem: In the dynamic and rapidly changing IT industry, if you do not upgrade your skills regularly you would soon become irrelevant to your organization, or even to the industry as a whole. There is a huge demand for many courses and certifications, but the plethora of ...

Well Known Trojan "Rakhni" Can Now Mine!
By: Manu
August 10, 2018

Well, Rakhni is not a new Trojan if you follow cyber security news, but what's new is that  Rakhni has a new cryptomining module added to it! Cryptomining started taking over the ransomware trend with the new developments in cyptocurrencies. With the added module, Rakhni can now analyze the infected machine and choose between encrypting ...

Moving Up: How to Become an Intermediate SOC Analyst
By: ginasilvertree
August 9, 2018

If you’ve worked as an entry-level SOC Analyst , you’ve likely performed many of the following tasks in this jack-of-all-trades  cyber position: Provide threat analysis and security logs for security devices Analyze and respond to hardware and software weaknesses and vulnerabilities ...

5 Best Practices to Mitigate Zero-Day Exploits
By: Dr. Michael J. Garbade
August 9, 2018

Zero-day exploits are serious security loopholes that are exploited within the same day they are exposed. They are aptly named “zero day” because the network administrators have zero days to fix the security flaw, which could have already been exploited. JPolansky , who has more than four years of ...