Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 11, 2019
By:
1880

Should You Outsource Cybersecurity or Keep It In-House
The diversity and sophistication of cyberattacks keep growing, posing threats for businesses of all shapes and sizes. Given that, it’s not surprising at all that the global cybersecurity market is expected to reach 300 billion by 20241. To avoid becoming victims of online threats, businesses need to invest in a solid cybersecurity strategy. This leads to two major options for them to choose – hiring an in-house Information Security team or outsourcing cybersecurity to th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 8, 2019
2509

By:
Azure offers remote access to enterprise-grade Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Database as a Service (DBaaS), and Software as a Service (SaaS). Azure’s data centers are spread across 54 regions, and its infrastructure is hybrid-ready, backed by over 90 compliance certifications, and provides a built-in back ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 6, 2019
3217

By: twinkle.k.1927
The world is going mobile, and there is every reason to be mobile. At a time when everything is moving at a break-neck speed, we need to be on our toes, and thanks to mobile devices, we have got everything on our fingertips. The rise in mobile devices is a blessing for us. Still, at the same time, cybercriminals and hackers have also repositi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 5, 2019
By: Savaramravindra4
3028

Blockchain in Cybersecurity: All You Need to Know
Introduction Today, we are highly dependent on the internet, and this situation has resulted in new business models and revenue streams for companies. But, along with these, new opportunities arose for hackers to steal sensitive data such as PII (personally identifiable information), health records, financial data, etc. This is a huge concern in today’s online world, and this is becoming more intense and prevalent day-by-day. Begin FREE Introduction to IT & Cybersecu ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 4, 2019
By: Solene Gabellec
2390

A Persistent Trojan Downloader for Android OS
This blog is by Knogin blog. Reposted with permission. A new security threat has emerged, this time for Android OS, making mobile security researchers scratch their heads for the past few months, the malware is called xHelper. The malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by infecting at least 2,400 devices on an average. A manual uninstall will not solve an issue as the app will ‘reappear̵ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 3, 2019
2212

By: jasminen
Companies are adopting the cloud — quickly. So quickly, in fact, that 60 percent of survey respondents1 say cloud-based business strategies are outpacing security processes and controls. For organizations, this creates a disconnect: Cloud services are now essential to embrace digital-first initiatives, but rapid adoption can lead to signifi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 2, 2019
1646

By: GarrettsG2
Amazon Web Services (AWS) continues to dominate the cloud market with low-cost deployments, services at scale, and continually evolving infrastructure and application solutions. The result is an IT marketplace that effectively assumes some prior AWS knowledge; hiring teams and C-suites now prioritize AWS experience and training when it comes ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 1, 2019
By: Solene Gabellec
1410

Threat Report – FuxSocy Ransomware
This blog is by Knogin blog. Reposted with permission. Summary  Researchers from MalwareHunterTeam have spotted a new variant of ransomware called FuxSocy; this malware impersonates the known Cerber ransomware. It operates by encrypting the data you have on the computer, changes the file, and its extension to a random one; then, it demands a ransom for its decryption. After this process is complete, the victim’s desktop wallpaper is changed. Additionally, a text file ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel