Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

May 5, 2019
By: Joeri Jungschlager
4118

6 steps to IoT disaster
So IoT is that buzzword used for prototyping, new technologies like ultra narrowband & updated machine2machine communication. There are a lot of good developments out there but there are also people, mainly consultants really comfortable with what they did. Resulting in cybersecurity disasters for operational technology. And a couple of questions cannot seem to be answered by people stuck in the traditional field of Information Technology.   So let’s go throug ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 4, 2019
3006

By: Vikrant Saran
Do not lag in this rapidly growing world of technology. Being a Cloud Professional, you must be aware of Microsoft Azure, it’s scope in the industry, and how it is becoming the most desired cloud computing platform for the industries. The recruiters are preferring the Cloud professionals with Microsoft Azure skills and certifications for th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 3, 2019
2640

By:
This blog originally appeared on the Cisco Security Blog, reprinted with permission Original Author : TK Keanini Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression I had. Our 2019 CISO Benchmark Report however, found ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 3, 2019
By: Shaquib Izhar
2345

Wanacry Ransomware analysis: detecting malicious network indicator and memory strings
In this post i will try to analyse wannacry Ransomware , i will try to do behavior analysis and will see what malicious network indicators we are getting , what command is it executing. Getting the binary  Downloading the Ransomware binary file from thezoo  , this repository contain binaries of lots of malwares , you can do your experiment with them in a safe environment. Now preparing wireshark for network detection to see what DNS request it will generate on launching ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 2, 2019
By: eshabarot
2596

CISA vs CISM vs CISSP Certification: What Are the Differences and Which One Is Best For Me ...
These abbreviations might puzzle your mind and also the definitions sound similar to one another. But if you look deeper you will actually find the difference from one another. Aspirants often confuse CISA, CISM, and CISSP from one another and take them as the same thing; however that not accurate. While CISA is pursued by IT auditors, CISM is mainly for the IT Information Security Managers and both these credentials are offered by ISC2. Whereas CISSP is often for somebody a ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 2, 2019
1013

By: limor2019
 Choosing the right open source component It is almost impossible to find developers that do not use open source (or OS) components in their software. According to a report made last year by Synopsis, out of the 1,100 code bases that were audited in 2017, 96% contained OS components, with an average of 257 components per software. Their popu ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 1, 2019
1391

By: WhiteHat4Ever
The interviewing process can often “feel like a job” within itself as the amount of time spent on interviews and searches can easily surpass forty hours a week. The field of cybersecurity is very high demand for EXPERIENCED professionals so the demand can create a dual sided coin of the field. The demand for experienced profession ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 26, 2019
By:
4804

Find out how fast your password can be hacked this World Password Day 2019!
The post originally appeared on the Thycotic blog! Check it out here Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place? This World Password Day 2019 step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. The ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel