0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Make Your CSO delighted with Your Open Source choices
By: limor2019
May 2, 2019

  Choosing the right open source component It is almost impossible to find developers that do not use open source (or OS) components in their software. According to a report made last year by Synopsis , out of the 1,100 code bases that were audited in 2017, 96% contained OS ...

Under Qualified OR Over Qualified ? What Should I Do ?
By: WhiteHat4Ever
May 1, 2019

The interviewing process can often "feel like a job" within itself as the amount of time spent on interviews and searches can easily surpass forty hours a week. The field of cybersecurity is very high demand for EXPERIENCED professionals so the demand can create a dual sided coin of the field. The demand for experienced professionals places an emphasis ...

Wireless Access Points - Info Gathering and Impersonation
By: kenunderhill
April 29, 2019

PII Gathering A false access point, or fake WAP, is a passive information-gathering technique used by malicious hackers and cybersecurity professionals. The basic idea is a wireless access point that is designed to lure users and ...

Find out how fast your password can be hacked this World Password Day 2019!
By: purvikshah
April 26, 2019

The post originally appeared on the Thycotic blog! Check it out here Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?This World Password Day 2019 step into the world of a ...

Steps I Took to Pass the CompTIA Security+ Exam
By: sh0m3r
April 24, 2019

Introduction Hello friends. I wanted to share about my recent passing of the CompTIA Security+ certification exam and what I did in preparation.But before I do, I want to share some of my background to give you an idea of where I was coming from:I had approximately 2 years of IT work experience with about ...

Cybrary and CSFI Announce Strategic Alliance to Expand Training and Career Guidance Offerings to Cyber Warfare Professionals
By: SLWelty
April 15, 2019

The DC-based non-profit’s strategic alliance will provide CSFI members access to the web’s largest cybersecurity training and career development platform College Park, MD - April 15, 2019 - The Cybersecurity Forum Initiative (CSFI) , a non-profit providing cyber warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training, today announced a new ...

Social media and black markets
By: purvikshah
April 10, 2019

This blog originally appeared on the Cisco Security Blog Original Author : Ben Nahorney You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access.Unfortunately, that’s not always the case. Sometimes ...

Malicious Tactics
By: WhiteHat4Ever
April 9, 2019

Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Malware is often known ...

5 Basic Principles of Project Management that every project manager must know
By: Vikrant Saran
April 6, 2019

Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project ...

Reverse Engineering for Beginners: Basic Programming Concepts
By: Dra4hos7
April 5, 2019

In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is ...