Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 2, 2019
By: jasminen
1418

Malvertising
This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it may appear as though the ads that are displayed are just a component of the site you’re visiting, this isn’t often the case ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 22, 2019
4710

By:
For too long, cybercriminals have been raking in billions of dollars from businesses around the globe through the use of crypto-ransomware. This is a specific type of ransomware that uses encryption technology to ‘scramble’ the data of its victims. The victim is then instructed to pay a ransom, by a specific deadline, to have their data d ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 21, 2019
5295

By: SLWelty
This blog was posted by Thycotic Security. It’s time to make sure you’re on your best behavior because Thycotic is coming to town! We’re kicking off our annual 12 Days of Thycotic contest and we want to make sure you’re on the list to receive 12 days of gifts and resources. This year, from Tuesday, December 3rd to Wednesday, December ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 19, 2019
By:
5293

How to recover SQL Database Password-Quick Tricks
If you lost SQL database Password and want to know “how to recover SQL database password”? Then this article will provide all the possible ways for recovering the SQL server database user password. Microsoft has created SQL Server Management Studio (SQL Server), which is a Relational Database Management System (RDBMS). It is used to store SQL (Structured Query Language) code that creates database files, stores all the information in it, and is managed in a manner that ca ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 16, 2019
By: Solene Gabellec
5350

Android Vulnerability – NFC exploitation
This blog is by Knogin blog by author Anthony Carballo. Reposted with permission. It was found in Android OS versions 8.0 & higher that the security warning message to install external apps does not prompt users when an app is transferred via NFC (Near Field Communication). This can give nefarious actor leverage to send and install a PUA (Potentially Unwanted Application) to your phone. Contrary to earlier Android versions where the system shows a notification to the use ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 15, 2019
2145

By: jasminen
    Fun Facts About Jeff! What course do you teach? AZ-300: Microsoft Azure Architect Technologies What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For that reason, I picked scuba diving to be a hobby in addition to cybersecurity. I hold a PADI Advanced open wa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 13, 2019
5082

By: ryan c
This blog is by authors: Ryan Corey, Co-Founder and Ralph Sita, Co-Founder, Cybrary The ever-expanding cyber threat landscape and never-ending shortage of cybersecurity skills make for a perfect storm across all industries. What has helped to counter this perfect storm is the subscription economy, where IT and security professionals can take ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 12, 2019
By:
2439

5 Steps to Modernize Security in the DevSecOps Era 2020
The practices of DevOps, Continuous Delivery, and Agile have become commonplace among the development and operations teams in most organizations. Even though application security is still young, vulnerabilities like XSS, SQLi, and remote code execution are current problems. Since HTTP is the common language of cloud, microservices, and serverless, these problems might be getting worse. This is the modern era of computing, and we recommend taking these five steps to ensure ap ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel