0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybersecurity in Healthcare: Prominent Cyberthreats
By: Nihad Hassan
June 23, 2021

Cybersecurity in Healthcare: Prominent cyberthreats These days, organizations across all industries utilize digital solutions to facilitate work operations and communicate with customers and other business partners. Healthcare organizations are no exception to this fact. Technology has changed how healthcare organizations offer their services to the public. However, when talking about cyberattacks against hospitals and medical centers, we are concerned about the ...

Learn To Secure Identity Access Management In AWS
By: Vijay Maripi
June 23, 2021

IAM Overview In the world of IT Organizations, Identity and access management (IAM) refer to the process of creating and maintaining the access, roles, and privileges of particular network entities (users and electronic devices) concerning several cloud and on-premises services. Customers, partners, and workers are examples of users, while computers, routers, mobiles, servers, sensors, and controllers are examples of electronic ...

Diamonds Are An Analyst’s Best Friend
By: Page Glave
June 22, 2021

What is cyber threat intelligence? According to NIST, cyber threat intelligence is “threat information aggregated, transformed, analyzed, interpreted, or enriched to provide the necessary context for decision-making processes.” Threat intelligence is differentiated from threat information by being modified to be actionable. There is so much information available that cybersecurity professionals must move beyond threat information to threat intelligence. An understanding ...

Improving Azure Security by Detecting the DualToy Trojan
By: Owen Dubiel
June 22, 2021

DualToy Trojan may sound like a children’s toy, but rest assured, it is not taken lightly. It is a nasty command and control attack that could wreak havoc upon your mobile enterprise security if proper detection steps are not taken. Being able to effectively identify legitimate C2 activity within your azure instance and quickly isolate it is the only way ...

Managed Detection And Response (MDR): Why It Is Important And Why We Need It
By: Nihad Hassan
June 21, 2021

In today's digital age, cyberattacks are increasing at a rapid pace. As more organizations worldwide are increasingly adopting automation to improve work operations and enhance their efficiency, the cost of a successful cyberattack becomes tremendous if adversaries succeed in penetrating or ceasing target organization IT systems. According to Cyber Security Ventures, the global cost of cybercrime will reach $10.5 ...

10 Tips For Being HIPAA Compliant
By: Shimon Brathwaite
June 21, 2021

HIPAA stands for the Health Insurance Portability and Accountability Act. It is a federal law that protects patients' privacy by prohibiting certain uses and disclosures of Personal Health Information (PHI). This is any health-related information that can be linked to any person. HIPAA affects any institution that collects, processes or stores PHI, even if it collects PHI on behalf of ...

Top Six Threat Intelligence Feeds
By: Nihad Hassan
June 18, 2021

Digital technologies are incorporated within every industry today. Organizations of all sizes and across all industries are increasingly utilizing IT to enhance work efficiencies and increase productivity. The proliferation of the internet has brought significant changes to how organizations and people interact using cyberspace. However, the digitization of society has also brought significant changes to cyberattacks. Criminals know this fact ...

Introduction To Computer Forensics
By: Shimon Brathwaite
June 18, 2021

Forensic science is the application of science to criminal and civil laws, primarily during criminal investigations. This isn't just exclusive to physical crimes. In many cases, computer forensics is an important part of investigating any cyberattacks. Even if there isn't going to be prosecution following a cyberattack, it's still good for companies to have computer forensics done. With this, the ...

Overview of Active Directory
By: Divya Bora
June 17, 2021

Active Directory (AD) was introduced as a part of Microsoft Windows Server 2000 in 1999. It is Microsoft’s proprietary directory service which is based on Lightweight Directory Access Protocol(LDAP). It enables the administrator access to manage permissions and access to network resources. AD stores data in the form of objects, and an object represents a single element like the user, ...

Detecting Suspicious Linux Commands In Sumo Logic VS Splunk
By: Owen Dubiel
June 17, 2021

Having the ability to detect suspicious Linux commands in your environment effectively is essential to a SIEM solution. The difference in comparing two different SIEM solutions, like Sumo Logic vs. Splunk, may be difficult at face value because they are both industry leaders. This article will provide you with several ways to better detect malicious Linux activity and search queries, ...