0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Hi Cybrary fans! April cyber kill chains bring May ransomware course campaigns. 🥷 We're kicking off a new month with cutting-edge courseware, labs, and podcasts designed to keep you informed and ready to defend your organization against critical cyberattacks! New Courses: Calling all blue teamers, red teamers, and everyone in between! Did you know that the financial industry saw a 1,318% increase in ...


The statistics don’t lie. Cybersecurity attacks are on the rise. From ransomware to Denial-of-Service attacks, the stream of evolving threats is seemingly never-ending. Understanding the techniques adversaries use to execute their attacks is vital to developing an effective detection and mitigation strategy. In our ongoing efforts to arm cybersecurity practitioners with the skills they need to stay ahead, we are ...


Russia's illegal invasion of Ukraine highlights growing concerns across Europe and beyond, not just in terms of military conflict but also cyberwarfare. When Russia launched a full-scale invasion of its neighbor on February 24, 2022, it quickly became clear that Ukraine could end up on the front lines of a much greater threat waged against the entire western world. In response, ...


Hi Cybrary fans! During every lunch break this week, you can bring the food and we'll bring the bite-sized training content to fuel your potential to detect adversary techniques! New Courses: In our three new courses covering techniques aligned to the MITRE ATT&CK Framework, you’ll explore how adversaries can abuse valid processes like the Kerberos ticket-granting service to stealthily move through an environment ...


In the worrying era of cyberwarfare, critical infrastructure and supply chains have become favorite targets for state-sponsored threat actors. Along with military assets, critical infrastructure has always been a prime target in acts of war. These systems, which include power generation, healthcare services, and transport, are vital to the normal functioning of society. While such assets are obvious targets in conventional ...


*On March 7, 2022, a security researcher named Max Kellermann publicly disclosed “Dirty Pipe,” a high-risk vulnerability in the Linux kernel that allows underprivileged users to leverage common processes to write readable files. “Dirty Pipe” weaponizes the piping communication mechanism in Linux, allowing adversaries to use it to gain write access and privilege escalation. Put simply, “Dirty Pipe” can give ...


Hi Cybrary fans! The only things certain in life this week are taxes (for those of you in the United States) and new vulnerabilities. Check out all the courses in our CVE series to get ahead of the game in learning how to defend your organization against all the latest security flaws! New Course: CVE Series: Spring4Shell by Matt Mullins If you're wondering who ...


As cybersecurity threats continue to evolve in the wake of the pandemic, IT leaders are looking for ways to shore up defenses and take a proactive approach to protecting key data. According to recent survey data, this translates directly into boosted security budgets: Eighty-one percent of organizations spending more on cybersecurity in 2022 to help mitigate attacks and stay ahead ...


Hi Cybrary fans! Whether you're on offense or defense, you'll love all the new content we have to share. From new releases to what's in production, here's what you should know. New Courses: We are excited to bring you more hands-on, bite-sized training aligned to the MITRE ATT&CK Framework. In the newest course to light up our TTP matrix, [Application Shimming & Data ...


What is purple teaming and why is it essential for cybersecurity? Purple teaming is a collaborative approach to protecting networks and systems from potential cyber threats. The term purple teaming refers to the combination of red teams (attackers) and blue teams (defenders). By working together through the purple teaming process, organizations can better understand the tactics of threat actors. __Implementing a ...