0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Top Six Threat Intelligence Feeds
By: Nihad Hassan
June 18, 2021

Digital technologies are incorporated within every industry today. Organizations of all sizes and across all industries are increasingly utilizing IT to enhance work efficiencies and increase productivity. The proliferation of the internet has brought significant changes to how organizations and people interact using cyberspace. However, the digitization of society has also brought significant changes to cyberattacks. Criminals know this fact ...

Introduction To Computer Forensics
By: Shimon Brathwaite
June 18, 2021

Forensic science is the application of science to criminal and civil laws, primarily during criminal investigations. This isn't just exclusive to physical crimes. In many cases, computer forensics is an important part of investigating any cyberattacks. Even if there isn't going to be prosecution following a cyberattack, it's still good for companies to have computer forensics done. With this, the ...

Overview of Active Directory
By: Divya Bora
June 17, 2021

Active Directory (AD) was introduced as a part of Microsoft Windows Server 2000 in 1999. It is Microsoft’s proprietary directory service which is based on Lightweight Directory Access Protocol(LDAP). It enables the administrator access to manage permissions and access to network resources. AD stores data in the form of objects, and an object represents a single element like the user, ...

Detecting Suspicious Linux Commands In Sumo Logic VS Splunk
By: Owen Dubiel
June 17, 2021

Having the ability to detect suspicious Linux commands in your environment effectively is essential to a SIEM solution. The difference in comparing two different SIEM solutions, like Sumo Logic vs. Splunk, may be difficult at face value because they are both industry leaders. This article will provide you with several ways to better detect malicious Linux activity and search queries, ...

Computer Viruses Explained
By: Shimon Brathwaite
June 16, 2021

Everyone who has used a computer has heard of a computer virus at one time or another. It’s the most popular term used when talking about online security but is often a misunderstood term. A computer virus is just one malware type. Malware is any software that harms a computer system against the owner’s wishes. When someone says that they ...

What is DataOPS?
By: Nihad Hassan
June 16, 2021

Digital transformation is rushing to occupy all business areas. In today's information age, organizations of all sizes and across all industries utilize digital solutions to facilitate work operations and enhance efficiency. The most apparent aspect of digitalization appears in the massive volume of digital data stored and processed by all organizations, from small to enterprise. Data becomes the lifeblood of organizations, ...

Top Nmap Tricks For A Vulnerability Assessment
By: Shimon Brathwaite
June 15, 2021

Nmap is one of the most accessible and most popular cybersecurity tools. It's the best port scanner on the market and open-source. It comes pre-installed in security-focused Linux distributions such as Kali Linux and Parrot OS. Nmap also comes as a python library, which can be used for implementing the functionality of Nmap in your computer scripts. While Nmap is ...

Detecting CobaltStrike Process Injection with QRadar
By: Owen Dubiel
June 15, 2021

CobaltStrike is one of those tools that you shiver at the potential power it holds when you hear its name. Its original use was a penetration tool primarily used for spear-phishing tactics, access to systems, and various other testing methodologies. Security teams must have a reliable way to detect its presence within their environment. Whether it is a planned pentest ...

Business E-mail Compromise (BEC)
By: Nihad Hassan
June 14, 2021

The digital revolution has brought many benefits to our society. One of the early innovative technologies was e-mail, which has become an imperative method of business communication. E-mail is fast, cost-effective, accessible, and convenient. By using e-mail, businesses can efficiently and reliably transfer electronic data (MS Office documents, photos, and data sheets). Despite the great benefits of e-mail, it is still ...

NotPetya: Its Consequences
By: Gabriel Schram
June 14, 2021

NotPetya is widely known as one of the most devastating variants of malware in history. The impact of it was felt particularly in Ukraine, but its area of effect was global. The success of this cyber attack was significantly due to the release of a 0-day exploit called EternalBlue. In this case, it was a 0-day vulnerability in Windows systems. ...