0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Hacker's Workflow
By: lowebrew
March 28, 2019

The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding of threats in the ...

Another Reluctant Hacker
By: PatAdel
March 28, 2019

As an early riser who typically starts his day around 4:45 am, it was way past my bedtime. My computer clock says 1:09 am and my eyes were still wide open with my brain exploring various paths available to me as my next step towards hacking the target box. Then I recalled how it all started and why this ...

Preventing Cybersecurity Disaster: Learning from the Top Security Breaches in 2018
By: limor2019
March 27, 2019

Looking back at 2018, it is difficult to ignore the chaos caused by the extensive incidents of data breaches that seemed to occur during each week of the year. Sensitive data and personally identifiable information of millions of individuals were exposed and made available on various platforms of the dark web for malicious users to buy and use. ...

Firewall Basic Bypassing Techniques With Nmap and Hping3
By: Uladzislau Murashka
March 27, 2019

Security of data always have in top of priorities for systems administrator’s. Systems admin’s always tries to keep all the ports close for public use which is not required. There are many  firewall  solutions available on the market starting from simple iptables and ending with complex cloud solutions. In our current case we will take a look ...

Your money or your life: Digital extortion scams
By: purvikshah
March 22, 2019

This blog originally appeared on the Cisco Security Blog. Reprinted with permission.Original Author : Ben Nahorney Link to his bio There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most ...

Top Cyber Security Threats for 2019
By: camiragano
March 21, 2019

Phishing Attacks Phishing, as in “phishing for phools”, is a cybersecurity approach that has been around for a long time. However, new defenses and security techniques have forced phishing to evolve. The proliferation of information provides attackers with new ...

The ITIL Effect: Is this certification still worth it?
By: Tatianna
March 20, 2019

Is This Service Certification Still Worth It? Certifications offer a dual benefit for IT professionals with improved career opportunities and increased compensation. Organizations also come out ahead since highly-skilled, well-trained technology staff can empower the critical transition from IT-as-cost-center to an essential aspect of business ROI. The result? More companies now demand top-tier certifications, and more IT staff recognize ...

Web Application Testing Methodology (Part 1).
By: ghostin
March 20, 2019

Web Application Testing Methodology (Part 1).   This will act as introduction to the upcoming series of posts. So, What will be in the Series ? Ans. In this series of posts, I'm going ...

3 Ways in which Jira Instances Can be Exploited
By: Ron
March 19, 2019

What is Jira? Jira is an issue tracking product developed by Atlassian that allows bug tracking and agile project management. It is being actively used by large number of big and small companies for issue tracking. The popularity of Jira has caused it a major target for hackers. We will ...

Software Subversion
By: Tatianna
March 19, 2019

Applications and Software Software subversion is a cybersecurity technique that directly targets the inner workings of an application. Anti-subversion software is designed to prevent software subversion attacks, but it’s essential to understand each software subversion technique to protect against ...