0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Choosing the right open source component It is almost impossible to find developers that do not use open source (or OS) components in their software. According to a report made last year by Synopsis , out of the 1,100 code bases that were audited in 2017, 96% contained OS ...


The interviewing process can often "feel like a job" within itself as the amount of time spent on interviews and searches can easily surpass forty hours a week. The field of cybersecurity is very high demand for EXPERIENCED professionals so the demand can create a dual sided coin of the field. The demand for experienced professionals places an emphasis ...


PII Gathering A false access point, or fake WAP, is a passive information-gathering technique used by malicious hackers and cybersecurity professionals. The basic idea is a wireless access point that is designed to lure users and ...


The post originally appeared on the Thycotic blog! Check it out here Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?This World Password Day 2019 step into the world of a ...


Introduction Hello friends. I wanted to share about my recent passing of the CompTIA Security+ certification exam and what I did in preparation.But before I do, I want to share some of my background to give you an idea of where I was coming from:I had approximately 2 years of IT work experience with about ...


The DC-based non-profit’s strategic alliance will provide CSFI members access to the web’s largest cybersecurity training and career development platform College Park, MD - April 15, 2019 - The Cybersecurity Forum Initiative (CSFI) , a non-profit providing cyber warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training, today announced a new ...


This blog originally appeared on the Cisco Security Blog Original Author : Ben Nahorney You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access.Unfortunately, that’s not always the case. Sometimes ...


Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Malware is often known ...


Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project ...


In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is ...