0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Password Protect A PDF Document
By: Nihad Hassan
August 3, 2021

In today's digital age, most information is created digitally and never finds its way into papers. Organizations of all types and across all industries are utilizing PDF documents in their daily work to store a variety of business-related information (e.g., customer, suppliers, third-party contractors, and tax info, to name only a few). Many global organizations use the PDF standard as ...

What Is Adversial Machine Learning?
By: Samia Oukemeni
August 3, 2021

Machine learning (ML) has been developed at an amazing speed over the past few years. It has led to transformational fields and introduced new capabilities. Machine learning algorithms have been used in different emerging applications that impact and will impact society in the years to come, such as self-driving cars, speech recognition, data analytics, sentiment analysis, and robotics, to name ...

Ryuk Ransomware Is Continually Changing
By: Gabriel Schram
August 2, 2021

Ryuk is an identified variant of ransomware that started making its impact in 2018. Like most ransomware, this shuts down system processes and encrypts the entirety of its target. In exchange for some bitcoin, users can unlock and regain access to their system and its data. Since its discovery, Ryuk has caused millions in damages from big game hunting. *Big ...

By: Elviraluke Napwora
August 2, 2021

The rise of endpoint devices in the corporate environment has increased organizations' security risks as each device is a potential attack surface. To counter some of these challenges, an organization must implement an endpoint security strategy with the necessary tools, such as EDR. Endpoint Detection and Response (EDR) solutions provide an integrated view of the security of endpoint nodes through continuous ...

Sources, Motives and Targets of APT
By: Divya Bora
July 30, 2021

WHAT IS ADVANCED PERSISTENT THREAT (APT)? An advanced persistent threat is a prolonged and targeted cyberattack in which an intruder, or a group of intruders, establishes their illicit presence on a network to infiltrate and/or exfiltrate as much valuable data as possible without being discovered. WORKING OF APT An APT's life cycle is much longer and more complex than any other ...

How To Crack WPA/WPA2 Wi-Fi Passwords Using Aircrack-ng
By: Tejareddy
July 30, 2021

Aircrack-ng is a set of tools in Kali Linux that can be used to assess Wi-Fi network security. It is capable of monitoring (capturing packets), attacking, and cracking Wi-Fi networks. In this post, Aircrack-ng will be used to crack a password-protected WPA/WPA2 Wi-Fi network. Attack Prerequisites Kali Linux can be A) installed or B) used in the Live version through a ...

Data Privacy Good Privacy Governance and Controls
By: Muhammad Tariq Ahmed Khan
July 29, 2021

There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, addresses, contact details, marriage, and holiday plans on social media. People are also inclined to share pictures of favorite foods, people, localities, and workplaces, in addition to providing opinions on sensitive issues (religious, national, political, ...

Top 5 Intrusion Detection Systems
By: Nihad Hassan
July 29, 2021

As the digital transformation continues to move steadily, people become more dependent on technology. Nowadays, computerized systems are prevalent in all industries to manage resources and handle various business operations. Protecting these assets has become vital for the continued operations of any organization. Cyberthreats are evolving every day in terms of number and sophistication. Malicious actors are continuously looking for ...

What Is Regex And Why It's Important For Log Analysis?
By: Shimon Brathwaite
July 28, 2021

Regex stands for regular expressions, and it’s a means of searching a string of characters (text) for specific patterns. An easy way to understand this is the command “Ctrl + F” function on most computers. If you ever wanted to find a word in a long essay, you press command + F, and a small search box appears in the ...

Phishing Using Shellphish
By: gagan1999
July 28, 2021

What is a Phishing Attack? A Phishing Attack is a fraud that attempts to obtain sensitive information like usernames, Bank Account Numbers, credit card information, and passwords. Phishing is an example of a Social Engineering technique used to deceive users. The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target, leading ...