0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Firewall Basic Bypassing Techniques With Nmap and Hping3
By: Uladzislau Murashka
March 27, 2019

Security of data always have in top of priorities for systems administrator’s. Systems admin’s always tries to keep all the ports close for public use which is not required. There are many  firewall  solutions available on the market starting from simple iptables and ending with complex cloud solutions. In our current case we will take a look ...

Your money or your life: Digital extortion scams
By: purvikshah
March 22, 2019

This blog originally appeared on the Cisco Security Blog. Reprinted with permission.Original Author : Ben Nahorney Link to his bio There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most ...

Top Cyber Security Threats for 2019
By: camiragano
March 21, 2019

Phishing Attacks Phishing, as in “phishing for phools”, is a cybersecurity approach that has been around for a long time. However, new defenses and security techniques have forced phishing to evolve. The proliferation of information provides attackers with new ...

The ITIL Effect: Is this certification still worth it?
By: Tatianna
March 20, 2019

Is This Service Certification Still Worth It? Certifications offer a dual benefit for IT professionals with improved career opportunities and increased compensation. Organizations also come out ahead since highly-skilled, well-trained technology staff can empower the critical transition from IT-as-cost-center to an essential aspect of business ROI. The result? More companies now demand top-tier certifications, and more IT staff recognize ...

Web Application Testing Methodology (Part 1).
By: ghostin
March 20, 2019

Web Application Testing Methodology (Part 1).   This will act as introduction to the upcoming series of posts. So, What will be in the Series ? Ans. In this series of posts, I'm going ...

3 Ways in which Jira Instances Can be Exploited
By: Ron
March 19, 2019

What is Jira? Jira is an issue tracking product developed by Atlassian that allows bug tracking and agile project management. It is being actively used by large number of big and small companies for issue tracking. The popularity of Jira has caused it a major target for hackers. We will ...

Software Subversion
By: Tatianna
March 19, 2019

Applications and Software Software subversion is a cybersecurity technique that directly targets the inner workings of an application. Anti-subversion software is designed to prevent software subversion attacks, but it’s essential to understand each software subversion technique to protect against ...

Today’s Top Career Options for Cyber Professionals
By: Tatianna
March 17, 2019

Cybersecurity professionals have many unique career opportunities , and the positions and terminology change as the industry evolves. Let’s take a look at some of the career options available today to professionals in cybersecurity. Information Security Analyst The ...

Practical SSL/TLS Attacks and Decrypting Web Traffic
By: Chang Tan Lister
March 15, 2019

Introduction: Practical SSL/TLS Attacks and Decrypting Web Traffic  Chang Tanchangtan@listerunlimited.comFor the purposes of this chapter, both the terms SSL (Secure Sockets Layer) and TLS (Transport Layer Security) shall be used interchangably to explain the same thing, that is the end-to-end encryption scheme that secures modern day HTTPS implementations via TLS. A lot of people know the consequences of compromised credentials but fail ...

Cybersecurity Insurance
By: Gunner Kerr
March 15, 2019

What’s the point of cybersecurity insurance? Cybersecurity insurance is crucial to the function of many organizations that rely on digital assets, but it is not widely understood. Unlike other types of insurance, cybersecurity insurance policies must be customized ...