0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

2018 Exchange Online Backup Solution
By: magstephen08
May 30, 2018

The popularity of third-party Exchange Online Backup solutions is sprouting around the ecosystem. Organizations old and new are working to fill the gaps observed within the Office 365 Exchange Online data protection policy. Many Office 365 Exchange professionals, including Microsoft MVPs and Office 365 Experts, have written about how Exchange Online does not support great backup plans to protect ...

By: strainer
May 30, 2018

Threat hunting is a proactive task with an assumption that your organization has already been breached, and you wanted to beat the average “dwell time” of 256 days, at least for me as a DFIR practitioner. This is usually done with the help of different tools that we call “arsenals,” primarily SIEM ( security information and ...

How to Convert Offline OST Mailboxes to PST Outlook File Format
By: kiryamartin14
May 29, 2018

A good OST to PST Converter Software can be used to easily fix all issues and errors with offline OST files. It is a 100% safe application that easily recovers Outlook OST files, and it also converts offline OST files with emails, contacts, calendars, tasks, notes, and appointments into PST Outlook file format. Just download the conversion ...

Data Analysis Surprise: Least Expected Organization Groups Fall Victim to Phishing Attacks
By: Bora Aytun Keepnet Labs
May 29, 2018

2017 was a record year for security incidents and data breaches. Phishing has become a huge threat to businesses and consumers worldwide, 1 and the number of recorded phishing attacks continues to grow exponentially. It is predicted that by 2020, phishing will be the number one cyber threat to your organization. 2 The above is common knowledge and ...

Identifying Phishing Emails: There is Nothing Good on the Other Side of That Link!
By: bigfattug
May 28, 2018

Cyber security is a hot topic these days, and for good reason. People are catching on, and they are seeing the need to learn about cyber security, whether they are a personal user or a business. But where do you start? Most people are not technically savvy; they are users in one capacity or another. Even people whose ...

Blockchain: Not Just for Digital Currency
By: Jessica
May 27, 2018

The word “blockchain” sounds self-explanatory in meaning, but there’s so much more to the term that comes down to one thing: decentralization. Centralized systems have been natural parts of our everyday lives for ages. For any matters involving U.S. federal law, for instance, one must report to the centralized federal government based in Washington, D.C. To electronically send money, ...

Keep Your Children Safe Online With Parental Control Apps
By: Jessica
May 27, 2018

Well before the surge of smartphones and mobile apps, and even before the age of the Internet in the nineties, keeping your children safe was a major responsibility, but it was pretty straightforward compared to how it is now. Back in the day, you told your children not to talk to strangers or take gifts from them. Children were ...

Inundated with Privacy Policy Emails and Questionable Acceptance Requests?
By: KMCLink
May 27, 2018

First, before I get down to the issue, let me apologize to the DevOPs and Marketing professionals who read this. I don’t intend to offend anyone, but I believe that after reading this, you will understand the irony and disbelief experienced by those of us trying to wade through all the new regulations and compliance being requested by the ...

Protect your computer! Let’s talk about Ransomware…
By: 奥力
May 26, 2018

Zenis, WannaCry, Bitman, Sombra, Spora, Jigsaw, Cerber, Microp, Crysis, CryLocker, Stampado, and Cryptodef are by no means all the ransomware families trying to extort money in exchange for your data. One early example of ransomware occurred in 1989 . Attackers circulated the ransomware via a floppy disk using snail mail, and it affected operating systems. ...

10 Cybersecurity Predictions for 2018
By: megmittal
May 26, 2018

Cybersecurity is now the topmost concern for all organizations. Given what happened in the previous years - the Equifax breach, WannaCry, Peta, Phishing scams, etc., 2018 is considered to be a terrifying year. Technology is getting better and so are the hackers.The predictions are that 2018 will be the year of a machine-on-machine attack. AI cyberattacks will be ...