Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 28, 2018
By: Yeridani
2753

Web Application Firewall
The new age security growing under different aspects, the spotlight are direct now to the Web Application Firewall (or WAF) filters for monitors, and blocks HTTP traffic to and from a web application, the proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch and Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive prote ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 27, 2018
2509

By:
Cloud computing is not a new concept. Many companies are already knee deep in Cloud, it is generally presented as the next logical move, particularly to replace an organization’s Infrastructure. It’s also good for tech startups as it cuts out a cost on infrastructure in the early stages. The benefits of cloud are well known, however, ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 26, 2018
2497

By: Shaquib Izhar
Recently, I did a post on the digital investigation of a backdoor PDF. In that post, I defined PDF structure and how to analyze these type of malicious files. In this post, we will see another method of investigating these malicious files. We will separate all the attachments and Stream Objects from the malicious PDF file and then we will se ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 26, 2018
By: Devendra
1236

Top 10 Reasons to Choose MOC On-Demand
So, you always want to pursue Microsoft training and attain the certification; however, lack opportunities to enroll in one hinder your way. Now, with Microsoft official on-demand training can be a boon for you. This is the right method to fulfill all your upskilling goals. Get all the benefits of Microsoft Official Training at one place with ON-Demand (Microsoft) courses. Let read about all the benefits of MOC On-Demand: Supreme Quality Content- It is a comprehensive an ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 26, 2018
By:
1077

iPhone Virus Attacks & the Importance of Anti-Virus Management
Imagine you wake up one morning and see the screen below on your PC. You press every button, turn it off and on again, and the screen remains the same. Yes, maybe you would want to cry! Guess that’s where the name came from…This is exactly what happened to Apple’s iPhone processor supplier. Taiwan Semiconductor Manufacturing Co. (TSMC) is a key supplier for the iPhone, they supply the processors for the new iPhone which is planned to be released in Summer 2018. On Fri ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 24, 2018
2122

By: Iselin
Networking Part 2 DNS “The human name of IP addresses” Allows the computer to translate human names to IP addresses In order to make it easier to browse the web more efficiently, we translate our destination addresses to Domain Names. 172.217.20.46 is the address for www.google.com for instance, but they both represent the same destinatio ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 23, 2018
2330

By: Iselin
Networking Part 1 IP Addresses “The virtual name and address of a device” IP addresses are logical addresses that are used for identifying devices on a network. IP addresses can be found where devices are connected to a network. For example, a phone, a computer, a router or a switch. It can either be static (Manually set and can not be ch ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 21, 2018
By: Tatianna
4271

Top Cybersecurity Predictions for 2019
This blog is sponsored by Thycotic Cybersecurity has again been a major focus in the past year as the compromise of elections and voting machines is on the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was demonstrated at DEF CON how to hack voting machines in two minutes – and even young children had successfully displayed how easi ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel