Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

March 28, 2019
By: PatAdel
4561

Another Reluctant Hacker
As an early riser who typically starts his day around 4:45 am, it was way past my bedtime. My computer clock says 1:09 am and my eyes were still wide open with my brain exploring various paths available to me as my next step towards hacking the target box. Then I recalled how it all started and why this moment re-emphasized why I have always been the disinclined or reluctant hacker. How did I get to this point? Sometime last year after my annual review at work, precisely ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 27, 2019
3983

By: limor2019
Looking back at 2018, it is difficult to ignore the chaos caused by the extensive incidents of data breaches that seemed to occur during each week of the year. Sensitive data and personally identifiable information of millions of individuals were exposed and made available on various platforms of the dark web for malicious users to buy and us ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 27, 2019
2959

By: Uladzislau Murashka
Security of data always have in top of priorities for systems administrator’s. Systems admin’s always tries to keep all the ports close for public use which is not required. There are many firewall solutions available on the market starting from simple iptables and ending with complex cloud solutions. In our current case we will take a ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 22, 2019
By: The Rapture
103723

Information Research and Content Categorization
By: The Rapture and fellow contributing Cybrarians Today’s Estimated Link Count: 1476 Updated 3/22/2019   I will continue to keep this article up to date on a fairly regular basis. (update: Thank you all for the positive feedback! I hope is has come in handy! I know I constantly come here just to find resources when I need them. I appreciate you all bearing with me on updates!) So for everyone who wants a list of resources to check out, this is it. I have copied all ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 22, 2019
By:
3495

Your money or your life: Digital extortion scams
This blog originally appeared on the Cisco Security Blog. Reprinted with permission. Original Author : Ben Nahorney Link to his bio There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from attempts to entice you with things lik ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 20, 2019
4390

By: ghostin
Web Application Testing Methodology(Part 1).   This will act as introduction to the upcoming series of posts. So, What will be in the Series ? Ans. In this series of posts, I’m going to show you step by step method to test a Web Application.   Always remember one thing, Every person has its own way to do the work.   ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 19, 2019
3698

By: Ron
What is Jira? Jira is an issue tracking product developed by Atlassian that allows bug tracking and agile project management. It is being actively used by large number of big and small companies for issue tracking. The popularity of Jira has caused it a major target for hackers. We will discuss some ways in which your Jira instance can be ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 15, 2019
By: Wrenekape
4079

A Much Needed Change
It was one of those deafening silences, those muted explosions, an event where two diametrically opposed ideas held presence, the embodiment of a mutual exclusion. If you can somehow imagine what it sounds like for a soul to crack, you’ll glimpse what it felt like. Right now, in March of 2019, I’m a teacher, and I’ve been a teacher for 12 years. But I won’t be a teacher for long. The transition will take time – and approaching 43, time is something that see ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel