Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

Profile image for olynch
May 26, 2017
By: Olivia
2218

UNM4SK3D: NSA, China, and Spotify
#wannacry (again).  Break out the tissues, this report will make you ‘WannaCry’ some more. Following the most massive ransomware campaign, there were multiple warnings against subsequent attacks and hackers using the NSA exploits to their advantage. Those warnings were correct, but the reality is even more severe. As a refresher, WannaCry “exploited a Windows zero-day SMB (Server Message Block) bug that allowed remote hackers to hijack PCs running on unpat ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bmfmancini
May 26, 2017
1774

By: Sean Mancini
The new wave of the internet is among us. We are now in the era of the “Internet of things,” (IoT) sensors and devices that connect to the internet from your home IP.  Does your fridge have a computer component that tells you the weather? What about a fridge that can connect to your mobile phone through an app? Yep, those fridges are ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for dasabiro
May 26, 2017
1430

By: dasabiro
The purpose of this article is to demonstrate an analytic maturity model through which cyber security experts/institutions can assess their progress in the use of user behavioral analytics to forge the thorough scrutiny in applying security postures that safeguard confidentiality, integrity and the availability of data to the right user prima ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for maundreykock
May 25, 2017
By: Maundrey Wilton Kock
2855

Hermes 2.0 Ransomware
Ransomware viruses have become a popular tool used by cyber criminals to exploit their victims. Once the ransomware virus finds its way into your computer it encrypts all the data on the PC, and if you want your data decrypted you are required to pay a certain amount of money via Bitcoin. Cyber criminals have now moved their focus to countries that are more vulnerable to ransomware attacks, like South Africa. Large corporations as well as individuals in South Africa experien ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bmfmancini
May 25, 2017
By: Sean Mancini
1294

How Can ISP’s Help with DDoS Mitigation?
We have seen it time and time again, DDoS attacks against organizations causing network interruptions and downtime. (What else is new?) These Organizations at times are hopeless at the hands of the attackers sometimes even for ransom. Think of a small or medium business with a 50Mbps internet connection that is getting attacked. What options does that organization have? Sure if they pay extra for a subnet with BGP peering and have the technical know-how, they can black hole ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bmfmancini
May 24, 2017
1642

By: Sean Mancini
Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list. What is the bogon list? The bogon list is a list of IP subnets that are either invalid non-routable IP blocks such as 192.168.0.0, or IP blocks that are not assigned.  It is impo ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for sconnect
May 24, 2017
2357

By: S-Connect
Welcome Back! As you are all aware of the facts surrounding the ransomware attacks, they are increasing rapidly from past years. Consider the biggest hits till now, you will come across these well-known names i.e.1. CryptXXX2. Dogspectus3. Crypto Locker4. Petya5. Cerber6. LockyNow we have WCry/WannaCry and Uiwix. Executive Summary Organizati ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for umar21
May 23, 2017
By: Umar SK Pathan
3508

Why “Hackers” Are Important for the Virtual World
Hackers! One of the most mysterious words in the dictionary. They seek for justice in an unjustified way. They are the guardians of the internet. They are everywhere, on every computer, on every network.  Who are they? What do they want? What is their motive? Let’s find out here. Nowadays, we live in two different worlds at the same time. Our physical world and the virtual world. We humans, during our evolution, have managed to maintain a good governmental system to simpl ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel