Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

February 21, 2019
By:
671

Today’s critical threats: A Cisco Security threat report
Author : Ben Nahorney For more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications. Today we are publishing our second report for 2019: Defending against today’s critical threats. This whitepaper looks back at the threat landscape over the past last ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 20, 2019
1219

By:
Restoring or exporting? Which one suits you better? Well, we are talking about your emails. We believe you are backing them up to some drive. We won’t ask you how because that depends on how and where you want it; and how your company gets the task done. Here we will be discussing the post-disaster situation, where you have lost emails from ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 20, 2019
1266

By: Vikrant Saran
Attaining azure certification is one of the most pertinent moves in your cloud career. So, before you start the preparation, the first thing to do is to decide the certifications that you must pursue to boost your career. With the new role-based Microsoft Azure certifications, you can now opt to go for precise skills that are required in your ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 19, 2019
By: sm0k3
2372

Regular Expressions: Why do you need it in pentest and how to learn
First, let’s see why we can use regular expressions and how to use them in the context of pentest. 1. Regular expressions can greatly help in the process of exploration and data collection – in order not to collect any garbage, we will be able to select only that part of the content that will be really useful for us. 2. In the process of developing auxiliary units for performing pentests (including even the stage of the  intelligence). 3. In case we got access to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 18, 2019
By:
1507

Benefits of virtualization
Virtualization is the process of creating a lot of machines on one machine , as if they work separately.This technology is becoming very popular due to its benefits . To understand it well , let’s consider 3 protocols of virtualization : Application / OS / hardware , when virtualization is used we can considder that there are more than one application and each one is working on its OS: Application(i)/OS(i)/virtualization layer/OS for (i..to n). (n number of VMS) The hyp ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 17, 2019
1690

By: dks11
Have you ever gotten an email titled something like “You have an outstanding invoice” or “YOU ARE THE LUCKY WINNER!!!!” and (hopefully) as quickly as you saw it, deleted it? Well, this is a form of social engineering. Social engineering takes many forms and the above example is one of the many ways attackers will try to exploit you an ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 15, 2019
2351

By: Muhammad Tariq Ahmed Khan
Since the threats from cyberattacks have emerged significantly and are continuously evolving, managing cybersecurity risks has become one of the substantial challenges faced by the organizations nowadays. Organizations have put in place technical and procedural controls to attain optimum cybersecurity. Furthermore, governments and regulators h ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 15, 2019
By: sambocetta
1797

Can the Presidential Alarm System be Hacked?
The autumn of 2018 brought something new to the general alert system of the United States. While the country’s old Emergency Alert System (EAS) that’s been in place for decades is still in use, a process for using text message alerts was added. The first test of what has been dubbed the Presidential Alert System appeared to be a success. Alerts by text are nothing new. Early 21st century legislation made it possible for states and other jurisdictions to set up emergency ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel