0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Networking Part 7 Antenna Types, MIMO, Wireless Standards & Technologies, Compatibility Antenna Types Transmitting radio waves through electric components An antenna is an electrical component made for sending and receiving radio signals. They convert electronic signals into electromagnetic waves and vice versa. Sometimes ...


The rise of SamSam ransomware This weekend the SamSam ransomware made the Dutch news. Why? Because SamSam is on the rise in our country. According to the article and source Fox-IT , small to medium businesses are targets. The report of Sophos, a result of a thorough investigation, reveals that the cybercriminal or cybercriminals behind ...

Intrusion Detection System (IDS) is a computer security system that monitors network traffics for malicious activities and alert the network administrator when malicious activities detected. IDS performs a passive monitoring and implement in passive/promiscuous mode. IDS can detect the malicious activities but cannot prevent it. IDS have these capabilities include: Monitoring about malicious ...

Improving threat prevention and detection is a strategic aspect of securing infrastructure against cyber attacks. Despite the availability of various resources that enhance cybersecurity, the tedious process that has previously relied on human involvement is like finding a needle in a haystack. Thanks to artificial intelligence (AI) technologies, significant breakthroughs have been made; and when leveraged, they allow ...


Us Agile enthusiasts don’t like big projects. Instead, we like to split a big objective or goal into Epics and Features. If you are managing things well eventually you will end up with a product Roadmap. A Roadmap tells you broadly what features will be delivered and when. For a long time now, Scrum Masters and Product Owners ...


C-suites are making room for chief information security officers. This security-focused executive position is gaining ground as enterprises look for ways to safeguard networks and services without compromising their bottom line. As noted by CBR , the role is evolving to include more responsibility and greater expectations, even as public and stakeholder focus puts CISOs in ...


Federal Loans and the Current State of Cybersecurity By Nessa Tragos , Cybersecurity Independent Consultant Will the Current Student Loan Debt Crisis Affect the Current State of Cyber Security? When I say debt, I'm not talking about technical debt that some companies have. I'm referring to the monetary debt ...


In today’s society there are millions of people who utilize tools online to get to know others all around the globe. This includes voice calling, video chatting, texting, sharing posts and other fun things that are offered on online services. However, studies have shown that everything that is placed online is also a threat to stay ...


Networking Part 6 VLAN & Port Configuration, VLAN & Port Filtering, VLAN Filtering Criteria & VTP Virtual Local Area Network Our virtual segment of the network within an already made LANA VLAN allows us to take the infrastructure for one local area network and make multiple virtual local networks. These help us to segment different broadcast ...


Keyboard Kata While you may not able to type well, one thing that can make you more productive is using keyboard shortcuts. I'm a Windows user, and these shortcuts apply to Microsoft products. (This leaves an opportunity for another Cybrarian will make a post about other OSs.) First, I'll give several ...