0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


It is not always an easy task determining which approach and what amount of resources are necessary to secure networks from cyber attacks. Protecting important information is essential when resources are at risk, but there are wasteful approaches and limited resources ...


Routing Metrics “Qualities used to determine best path” • Hop count: how many other routers does a signal need to pass?• Maximum Transmission Unit (MTU): The maximum size of a single packet we can send. Bandwidth and ports limit how much data can be pushed through• Casts: reliability, Roundtrip, cost etc.• ...


Just the Facts Monday night (for me, I'm in England at the moment), the question/answer site Quora.com reported a data breach potentially affecting 100 million accounts (for those who read my last article, this is about a 1.5 on the Thriller scale). According to their release, the following information was obtained by attackers: ...


There are a countless number of ways to monitor a network, and often times this means gathering target information and using software to perform reconnaissance. The software is used in acquiring a host target within an organization, extracting information from these ...


Good news Dell! You are no longer the cybersecurity nightmare of the week. Bad news 500 million people! You are now the victims of a truly magnificent data breach. First, just the facts. On 30 November, 2018, Marriott International issued a press release ...


CISSP is considered as Internationally acknowledged benchmark for the information security professional. From the past two decades, it has gone through the test of times and proved its mettle. Stands for Certified Information Systems Security Professional and is expected to take a great deal of time and efforts from the aspirants by studying CBK - Common Body of Knowledge ...


Open Source Intelligence (OSINT) is defined as intelligence collected from publicly available sources. In the intelligence community, the term "open" refers to overt, publicly available sources; it is not related to open-source software or public intelligence. This form of gathering and analysis of information is crucial to understand for both cyber and physical security professionals. Today I ...


With the increase in data loss occurrences, there is a massive demand for data recovery solutions. In the world of internet, the supply of information is often surplus than needed. However, a large number of solutions and fixes on the internet—that promises to restore data and fix most drive issues—consists of myths; Myths that can permanently destroy your ...


Nuno Filipe Romão Pereira lives in Portugal and works in Lisbon as a System Administrator and IT department Technical Coordinator. After a few months as a Cybrary Insider Pro, he experienced some amazing results from his career development studies, and offered to share them on Cybrary as inspiration for other Cybrarians. In early 2018, I ...


The new age security growing under different aspects, the spotlight are direct now to the Web Application Firewall (or WAF) filters for monitors, and blocks HTTP traffic to and from a web application , the proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch and Web Application Firewall (WAF) ...