0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



This blog originally appeared on the Cisco Security Blog. Reprinted with permission.Original Author : Ben Nahorney Link to his bio There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most ...

Phishing Attacks Phishing, as in “phishing for phools”, is a cybersecurity approach that has been around for a long time. However, new defenses and security techniques have forced phishing to evolve. The proliferation of information provides attackers with new ...


Is This Service Certification Still Worth It? Certifications offer a dual benefit for IT professionals with improved career opportunities and increased compensation. Organizations also come out ahead since highly-skilled, well-trained technology staff can empower the critical transition from IT-as-cost-center to an essential aspect of business ROI. The result? More companies now demand top-tier certifications, and more IT staff recognize ...


Web Application Testing Methodology (Part 1). This will act as introduction to the upcoming series of posts. So, What will be in the Series ? Ans. In this series of posts, I'm going ...


What is Jira? Jira is an issue tracking product developed by Atlassian that allows bug tracking and agile project management. It is being actively used by large number of big and small companies for issue tracking. The popularity of Jira has caused it a major target for hackers. We will ...


Applications and Software Software subversion is a cybersecurity technique that directly targets the inner workings of an application. Anti-subversion software is designed to prevent software subversion attacks, but it’s essential to understand each software subversion technique to protect against ...


Cybersecurity professionals have many unique career opportunities , and the positions and terminology change as the industry evolves. Let’s take a look at some of the career options available today to professionals in cybersecurity. Information Security Analyst The ...


Introduction: Practical SSL/TLS Attacks and Decrypting Web Traffic Chang Tanchangtan@listerunlimited.comFor the purposes of this chapter, both the terms SSL (Secure Sockets Layer) and TLS (Transport Layer Security) shall be used interchangably to explain the same thing, that is the end-to-end encryption scheme that secures modern day HTTPS implementations via TLS. A lot of people know the consequences of compromised credentials but fail ...


What’s the point of cybersecurity insurance? Cybersecurity insurance is crucial to the function of many organizations that rely on digital assets, but it is not widely understood. Unlike other types of insurance, cybersecurity insurance policies must be customized ...


Security Awareness is Cybersecurity Social engineering is a cybersecurity approach that affects individuals and organizations both public and private. Bypassing the technical aspect of hacking, social engineering relies on convincing an individual to compromise sensitive data or grant unauthorized ...