Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 21, 2018
By: oluwaseunmi
3569

How to Recover a Cisco IOS Router Password
This technique is very useful for when you forget or misplace your router password. It gives you easy access to recover your router. What You Need Router (whose password is to be recovered) PC (laptop or desktop) Router Console cable (to connect PC to Router) Terminal emulation software (on PC), e.g., puTTy Steps          Connect the affected router to your PC using the Console cable.          On the PC, launch your terminal emulation software and enter the fol ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 21, 2018
2159

By: BrBr
http://traffic.libsyn.com/brakeingsecurity/2018-028-final.mp3 If the player above does not load, you can listen to the podcast here: http://traffic.libsyn.com/brakeingsecurity/2018-028-final.mp3 Below are the show notes from our episode. We discussed a few topics this week, including: The issues we had enabling HTTPS on our main website, ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 18, 2018
7343

By: Sebastián Vargas
There is a need to begin to better protect WordPress platforms. With the huge amount of IOC, where the WordPress platforms are attacked, which I have seen closely, I created this guide for free use. If you want to collaborate with me in any endeavor, you can contact me at sebastian.vargas@protonmail.com. If you do not believe me about the amou ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 17, 2018
By: Dr. Michael J. Garbade
11625

Understanding Netcat, the Swiss Army Knife for Ethical Hacking
Netcat (usually abbreviated as nc) is a powerful information security tool used for reading from and writing to network connections using the TCP or UDP protocol. Usamaazad, who has more than four years of cyber security experience and currently teaches people his skills, says that “contrary to most tools, Netcat is capable of performing multiple functionalities, something which has earned it the name of the Swiss army knife for ethical hacking.” Netcat is a feature-rich ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 15, 2018
By:
8446

Truths & Myths — Cyber Insurance for Social Engineering Fraud
I’ve heard it more frequently over the past few weeks, “cyber liability insurance doesn’t cover anything.” That statement is usually followed by a story about someone who had a cyber claim that wasn’t covered. A majority of the time, these stories involve social engineering fraud. According to Interpol, social engineering fraud is “a broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential i ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 14, 2018
9876

By: oluwaseunmi
A password is known generally to be the secret code you input to gain access to a resource. Authentication is the process of gaining access to a resource. Passwords are a means of authentication. They are usually our only means of authentication for our online accounts. Are they hackable? Yes, very much so. How? Classic hacking of passwo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 13, 2018
5814

By: Sebastián Vargas
Here, I present some important ideas with an emphasis on understanding rather than on cybersecurity as a specialty, even though it has different categories with different bodies of knowledge, as expected. So, do you know cybersecurity? I invite you to read this lightweight article to understand the different categories that can be found in cyb ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 10, 2018
By: Manu
5934

Well Known Trojan “Rakhni” Can Now Mine!
Well, Rakhni is not a new Trojan if you follow cyber security news, but what’s new is that Rakhni has a new cryptomining module added to it! Cryptomining started taking over the ransomware trend with the new developments in cyptocurrencies. With the added module, Rakhni can now analyze the infected machine and choose between encrypting or mining. Well, that is bad news, but how it works is interesting. This behavior was first detected in India, Russia, Ukrain, Germany, ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel