Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

March 8, 2018
By: sf_dod
4218

Is Destructive Malware Slowly Becoming a Common Trend?
  Ask any end user or general IT administrator which cyber-attack they are most fearful of. There is a good chance they will respond with “Ransomware”. I would quickly argue that any IT administrator who is worth their paycheck should not be fearful of Ransomware. A robust backup plan, a tested and proven incident response/recovery plan and an IT staff that has a sound understanding of their own environment should allow for a smooth and efficient recovery from Ranso ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 8, 2018
4698

By: barrackdiego
WordPress is the leading blogging platform. In the last decade or so, it has been adopted as a great platform for building dynamic websites. The reason for its increased popularity can be attributed to its huge community and user-friendly interface. One thing that most people don’t know is that this platform is PHP based and uses MySQL dat ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 7, 2018
5436

By: Sean Mancini
  So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see. One of the products that caught my eye was Darktrace they sell their product as the “Enterprise Immune System” essentially they are smashing Big Data and network analysis togeth ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 7, 2018
By: Shaquib Izhar
23985

Hide Secret Message Inside an Image Using LSB-Steganography
  Imagine a scenario where we want to send a confidential message and don’t want anyone except the recipient to read it. We will use every possible methods to make our message hidden from any third person. So here i am going to use LSB-Steganography method to hide our message inside an image.   What is LSB  image source  Least Significant bit also called RightMost Bit is a lowest bit of a binary number. For example in binary number 10010010, “0& ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2018
By: Masood
4700

Best Practices for Infrastructure as a Service (IaaS) in Microsoft Azure
According to Gartner, by 2020 worldwide public cloud services will account for $383 billion, a fifth of which (19%) will be Infrastructure as a Service. In a June 2017 report, Gartner put Microsoft as a leader in Magic Quadrant for Cloud Infrastructure as a Service, worldwide, along with Amazon Web Services. A successful cloud implementation requires a secure foundation and architectural design. Increasing complex environment, loss of visibility and control, unexpected bill ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2018
2420

By: Sean Mancini
  Another cool gadget I saw at the Toronto Tech Security Conference was ultra-secure USB storage by Apricorn http://www.apricorn.com. Now, this is cool their product is a secure USB thumb drive or SSD portable hard-drive it features built-in encryption built into the chip meaning no software needed on the PC. They have a wide range of dr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2018
3866

By: El1t3S1D
    Did you know that learning Linux/UNIX is one of the most important aspects of learning Cyber-Security/Information-Security? Q. What is Linux? A. Its a freaking OS. Linux is a family of free and open-source software operating systems built around the Linux kernel. Linux is packaged in a form known as a Linux distribution (or distr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 5, 2018
By: shantanurauthan
4238

Flaw in μTorrent That Lets Hackers Control Your PC Remotely
Most of us are using the popular and handy software called μTorrent for downloading and streaming stuff and if you are one of them then you must download its latest version ASAP. You must have seen after pressing that red cross button to close torrent, it still runs in the background until you exit it.Added to that the μTorrent Classic and μTorrent Web apps run in the background on the Windows machine and start a locally hosted HTTP RPC server on ports 10000 and 19575, ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel