0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Best Algorithms For Encryption Of Your Data
By: Shimon Brathwaite
January 25, 2022

Encryption is one of the most important aspects of securing online communications. It is easier than you might think for someone to eavesdrop on a conversation or access data while it is in transit from one place to another. Encryption is simply the process of encoding information so that the original message cannot be understood until it has been decrypted. ...

Why Log4j Is A 0-day Vulnerability
By: Vijay Maripi
January 24, 2022

Overview of Zero-day Vulnerability A zero-day vulnerability has been discovered but not yet patched in a device or system. A zero-day exploit is an exploit that targets a zero-day vulnerability. Zero-day refers to newly found security flaws that hackers can exploit to attack systems. Attackers use this newly discovered security flaw by exploiting organizations where developers recently found the fault, ...

Why People Are An Essential Part In Crafting The Organization's Security Posture Strategy?
By: Evan Morris
January 24, 2022

header Creating a strategy for an organization's cybersecurity posture is often equated to the technical aspects. It is associated with the security hardware, software tools, and related protocols. However, many organizations fail to consider one of the most important factors: people. As experienced cybersecurity expert and senior SANS Institute instructor Lance Spitzner puts it, humans are [the weakest link in the cybersecurity ...

2022 Cybersecurity Predictions
By: Kevin Hanes
January 21, 2022

2021 could be considered the year that everyone finally reconsidered how cybersecurity affects everyday life. Attacks on critical infrastructure such as the Colonial Pipeline, JBS, and Iowa Grain Cooperative resulted in inflated oil prices and risks of food shortages. Additionally, cyberattacks on hospitals threatened patient care and PII, plus businesses felt financial pains courtesy of the Kaseya attack and T-Mobile ...

Endpoint Security: Working, Features, Importance and Benefits
By: Divya Bora
January 20, 2022

header WHAT IS ENDPOINT SECURITY? Before discussing endpoint security, let's first understand what endpoints are. An Endpoint is defined as a device that acts as a physical endpoint to a network and can connect to an organization's network from outside its firewall. Examples include desktops, mobile phones, laptops, printers, IoT devices, and Point Of Sale(POS) systems. Organizations often utilize these endpoints ...

Steps In Handling Cybersecurity Incidents
By: Nihad Hassan
January 19, 2022

As the digital transformation accelerates, an organization's dependence on digital technologies expects to increase before long. Nowadays, most organizations, regardless of their type or industry, are leveraging digital technologies in one way or another to support their core business functions. The increased reliance on technology and computer networks brings numerous advantages to organizations, such as: reducing operational costs, increasing customer satisfaction ...

Do You Think You Know What Log4J Is?
By: Prasanna Peshkar
January 19, 2022

Cyberspace is full of techno-innovations as well as vulnerabilities. Since December 10, security experts uncovered a crucial vulnerability called Log4Shell in servers backing the popular game Minecraft. Attackers have been developing numerous exploit attempts of the Log4j 2 Java library. This article is all about the Log4J vulnerability. What is Log4J? A Java library is __simply a group of classes ...

Top Five Threats In Cybersecurity For 2022
By: Shimon Brathwaite
January 18, 2022

Cybersecurity has continued to evolve as hackers have discovered the profitability of hacking large companies. In 2020, we saw significant growth in many areas of cybersecurity[1]: 238% rise in attacks in the finance sector Cloud-based attacks increased by 630% between January and April Ransomware attacks increased by 148% Phishing attacks increased by 600% Average cost of cyberattacks was around ...

What Is CRISC Certification?
By: Cybrary Staff
January 14, 2022

For IT professionals, it’s important to improve their skills continuously. Numerous information technology certifications are available from various certifying entities to help IT professionals advance into promotions or better positions. The Certified in Risk and Information Systems (CRISC) credential, awarded by ISACA, is a vendor-neutral certification designed for mid-career IT and IS risk, audit, and security professionals. What Is ...

Physical Penetration Testing: Benefits and Methods
By: Divya Bora
January 13, 2022

header What is Physical Penetration Testing? Physical Penetration Testing is defined as a real-world intrusion attempt to see how attackers might gain physical access to the organization’s infrastructure, systems, or employees. It is also known as Physical Intrusion Testing. It aims to identify, expose, and improve the organization’s physical security and defense weaknesses that malicious hackers can exploit. BENEFITS OF PHYSICAL ...