0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Get the Best Traffic Solution to Provide Integrated Traffic Management
By: trafiksol
August 25, 2018

The integrated traffic management program can leverage the ability of the NSI platform. It can be used for telemetry from the networks, and other data centers can be the infrastructure to deliver the intelligent traffic management. It can be integrated into the traffic management program in the NSI with the initiative for developing ...

Extracting and Enumerating Information From a WordPress Website
By: richardb8006
August 23, 2018

Don’t you just love it when a company has made their website in WordPress? Well, I do.Well the truth is, with WordPress, when you are running it on premise or on a hosting website, your website is a potential danger. Be very careful of what you state on your website and what kind of data you ‘collect’ that will ...

Cyber Insurance Coverage for GDPR Fines & Penalties
By: travissholt
August 22, 2018

Yes, there is insurance coverage for GDPR Fines & Penalties and with potential fines being 4% of previous year’s annual global turnover or $20mm Euros, whichever is  GREATER,  this is a good thing. Not a day goes by that I don’t get questions from companies of all sizes about GDPR. This includes the implications for their business. Most ...

CISM Certification: What’s the Benefit, and Why Does it Matter?
By: Tatianna
August 22, 2018

Get CISM Certified: The benefits and meaning There aren’t enough information security professionals to go around. That’s the word from a recent ISACA report , which found that 60 percent of organizations had open security positions which took on average three ...

How to Recover a Cisco IOS Router Password
By: oluwaseunmi
August 21, 2018

This technique is very useful for when you forget or misplace your router password. It gives you easy access to recover your router. What You Need Router (whose password is to be recovered) PC (laptop or desktop) Router Console cable (to connect PC to Router) ...

[BrakeSec Podcast] Windows Registry Runkeys, DNS Logging + More
By: BrBr
August 21, 2018

[embed]https://traffic.libsyn.com/brakeingsecurity/2018-028-final.mp3[/embed] If the player above does not load, you can listen to the podcast here: http://traffic.libsyn.com/brakeingsecurity/2018-028-final.mp3 Below are the show notes from our episode. We discussed a few topics this week, including: The issues we had enabling HTTPS on our main website, in a PaaS system (Libsyn) DNS logging, for forensic purposes ...

Notable Malware Attacks and Security Vulnerabilities
By: Jessica
August 19, 2018

Computer and Internet technologies have gone through amazing trends and developments that have always made headlines in the news since they’ve been around over the past several decades. With the way that these technologies have made everyday tasks like household budgeting and scientific research significantly easier and faster than ever before, they are certainly newsworthy. What have also made ...

What is Firmware?
By: Jessica
August 19, 2018

Computer-savvy or not, anybody who has ever touched a computer has heard the terms “software,” “hardware,” “adware,” “spyware,” and “malware,” whether it be from the news, the Internet, or everyday conversation. There’s another type of “ware,” however, that does not seem to be as familiar to many, but it should be: firmware. Firmware Defined Firmware is a very specific ...

Hardening WordPress Like a Boss
By: Sebastián Vargas
August 18, 2018

T here is a need to begin to better protect WordPress platforms. With the huge amount of IOC, where the WordPress platforms are attacked, which I have seen closely, I created this guide for free use. If you want to collaborate with me in any endeavor, you can contact me at sebastian.vargas@protonmail.com . If you do not believe ...

Understanding Netcat, the Swiss Army Knife for Ethical Hacking
By: Dr. Michael J. Garbade
August 17, 2018

Netcat (usually abbreviated as nc) is a powerful information security tool used for reading from and writing to network connections using the TCP or UDP protocol. Usamaazad , who has more than four years of cyber security experience and currently teaches people his skills, says that “contrary to most tools, Netcat is ...