Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

August 9, 2018
By: Dr. Michael J. Garbade
8280

5 Best Practices to Mitigate Zero-Day Exploits
Zero-day exploits are serious security loopholes that are exploited within the same day they are exposed. They are aptly named “zero day” because the network administrators have zero days to fix the security flaw, which could have already been exploited. JPolansky, who has more than four years of cyber security experience and currently teaches people how to perform network analysis, says that “zero-day exploits in business environments are a cause of concern since some ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 8, 2018
4264

By: LoQ
How to Set Up Extensions and Session Handling for HMAC Signature In this tutorial, we are going to see how to add a Python script to Burp extender and set up the session handling rule to run the extender. Things that we need: Python script from https://github.com/malcomvetter/BurpHmac/blob/master/BurpHmac.py Burp Suite – any type (free/ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 8, 2018
8592

By: veronica90
Cybersecurity is something modern companies have to take seriously. It’s also more than just the stuff the IT department does behind closed doors – it all starts with creating the right cybersecurity culture and adopting the right software for small business.  To build a brand in the market, perfect cost-effective marketing strategies wil ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 7, 2018
By: Veselina Dzhingarova
4171

Looking Into the Future of 3D Rendering
Three-dimensional (3D) rendering converts 3D models into 2D representations on the viewer’s screen. It may involve effects to make the 3D model in a 2D format look like a photo, or it may not, depending on the application. For example, when showing off an architectural design, adding details like landscaping is intended to make the customer buy into the vision. In some cases, 3D rendering converts three-dimensional simulations into 2D animations. Let’s look at the future ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 6, 2018
By: sproutx2125
2296

Stopping Scams Against the Layperson
My current career provides me with the opportunity to speak with many people who have become victims of scammers. These scammers utilize Internet technology to gain access to a victim’s computer and lock it from the victim. These victims are then forced into paying money or sending gift cards to unlock their computers. Many times, the person I am meeting with seems like the same person as the last but with a different name. There appears to be a certain type of demograp ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 4, 2018
9957

By: clarkincnet
Rapid7 released a research report last month entitled Under the Hoodie – Lessons from a Season of Penetration Testing.   The report outlines some interesting finds from 268 penetration engagements from the period of September 2017 through June 2018. Maybe it’s just me, but using the word “hoodie” in the name of the report conjures an ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
August 1, 2018
6397

By:
It is always difficult to figure out ways to attract new customers. After all, you are competing for the same customers as your rivals are. But there are ways you can gain a competitive edge so that you can consistently find and keep new customers, as well as retain those customers who have been with you from the beginning. Find New Ways to M ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 31, 2018
By: Dr. Michael J. Garbade
15591

A Brief Introduction to Kali Linux for Cybersecurity
What is Kali Linux? Kali Linux, initially released in 2013, is a popular Debian-based Linux distribution operating system mainly used by penetration testers and digital forensics experts. The cyber security tool is maintained and funded by Offensive Security Limited, a prominent IT security company. Kali Linux is the reincarnation of BackTrack, a Linux distribution software that was used for penetration testing. Darren Rainey, who has more than four years of information s ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel