Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 4, 2019
By: Solene Gabellec
2412

A Persistent Trojan Downloader for Android OS
This blog is by Knogin blog. Reposted with permission. A new security threat has emerged, this time for Android OS, making mobile security researchers scratch their heads for the past few months, the malware is called xHelper. The malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by infecting at least 2,400 devices on an average. A manual uninstall will not solve an issue as the app will ‘reappear̵ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 3, 2019
2254

By: jasminen
Companies are adopting the cloud — quickly. So quickly, in fact, that 60 percent of survey respondents1 say cloud-based business strategies are outpacing security processes and controls. For organizations, this creates a disconnect: Cloud services are now essential to embrace digital-first initiatives, but rapid adoption can lead to signifi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 2, 2019
1668

By: GarrettsG2
Amazon Web Services (AWS) continues to dominate the cloud market with low-cost deployments, services at scale, and continually evolving infrastructure and application solutions. The result is an IT marketplace that effectively assumes some prior AWS knowledge; hiring teams and C-suites now prioritize AWS experience and training when it comes ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 1, 2019
By: Solene Gabellec
1426

Threat Report – FuxSocy Ransomware
This blog is by Knogin blog. Reposted with permission. Summary  Researchers from MalwareHunterTeam have spotted a new variant of ransomware called FuxSocy; this malware impersonates the known Cerber ransomware. It operates by encrypting the data you have on the computer, changes the file, and its extension to a random one; then, it demands a ransom for its decryption. After this process is complete, the victim’s desktop wallpaper is changed. Additionally, a text file ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 31, 2019
By: SLWelty
1724

Meet Your Instructor: Abdulrahman Alnaim
    Fun Facts About Abdul! What course do you teach? Cybersecurity Kill Chain What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For that reason, I picked scuba diving to be a hobby in addition to cybersecurity. I hold a PADI Advanced open water Diver license. Your favorite food? I always say “I wouldn’t be overweight if I was picky in food” for me all the food that is tasty. Social Media ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 30, 2019
1625

By: GarrettsG2
The cloud is a critical force in enterprise IT environments — a recent survey found that 94 percent of businesses now use the cloud, and 84 percent of companies have adopted a multi-cloud strategy to ensure they get the most from distributed computing deployments. For IT professionals, this creates market demand: With the right expertise, i ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 29, 2019
1599

By: jasminen
Microsoft Azure is closing the gap with market leader Amazon Web Services. Recent data1 put Azure adoption only slightly behind Amazon’s cloud behemoth as Microsoft expands cloud services and many organizations implement a multi-cloud approach to maximize IT impact. As a result, IT professionals already working with the cloud or considering ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 28, 2019
By: jaspreet17
1619

Blockchain (Reshaping the Future of Technology)
Nowadays, blockchain can be seen as an innovative protocol that reshapes the future of technology. This article is about the description of this protocol as what are the issues in current technology, how blockchain removes these limitations along with various applications and challenges of it. Begin FREE Intro to IT and Cybersecurity Course >> Current Technology Issues We take an example of a financial institution like a bank, as shown below, which is used for transferring ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel