Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

April 10, 2019
By:
6110

Social media and black markets
This blog originally appeared on the Cisco Security Blog Original Author : Ben Nahorney You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access. Unfortunately, that’s not always the case. Sometimes such activity takes place in very public places, such as social networks. Researchers at ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 9, 2019
5679

By: WhiteHat4Ever
Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Ma ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 6, 2019
7445

By: Vikrant Saran
Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project manager or as ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 5, 2019
By: Dra4hos7
7956

Reverse Engineering for Beginners: Basic Programming Concepts
In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of ​​the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is compiled using Microsoft Visual Studio 2015, so some features in newer versions may be used differently. IDA Pro is used as a disassembler. Andinitializing variables Variables – one of the main ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 2, 2019
By:
4996

What is Data Science?
Without a doubt, data is everywhere around us and we are always putting in an effort to increase the path as the world is interacting and improving more with the internet. Most of the industries have these days come to the conclusion that all the power behind data as well as understanding how it can improve as well as change not just how we do business but also how we can experience some of them. Data Science is also understood as science that decodes all the information abo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 29, 2019
5821

By:
Article posted courtesy of : Thycotic 1. Take the human element out of the equation whenever you can – Use a password manager that doesn’t require a user to remember their password to login to sensitive systems. 2. Remove unnecessary password rotations – I’m going to have to side with the NIST’s proposed password security policy ch ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 28, 2019
5023

By: lowebrew
The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 28, 2019
By: PatAdel
3508

Another Reluctant Hacker
As an early riser who typically starts his day around 4:45 am, it was way past my bedtime. My computer clock says 1:09 am and my eyes were still wide open with my brain exploring various paths available to me as my next step towards hacking the target box. Then I recalled how it all started and why this moment re-emphasized why I have always been the disinclined or reluctant hacker. How did I get to this point? Sometime last year after my annual review at work, precisely ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel