0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Credential Stuffing vs. Brute Force: What's The Difference?
By: Joe Pettit
October 29, 2021

Password compromise remains a primary method by which malicious actors gain access to applications, systems, and networks. Cybercriminals deploy a range of techniques to crack passwords, some of which are technical while others don't require any technical skillset. This article defines and compares two of the most used password hacking techniques—credential-stuffing and brute-force attacks. Password Compromise: A Perennial Security ...

How To Get A CEH Certification
By: Cybrary Staff
October 28, 2021

“Ethical hacker” used to be a term that described an individual who had the knowledge and skills to be a hacker but also had a moral code that wouldn’t allow for taking part in illegal activity. However, over time, the term has come to describe numerous information security professionals who provide organizations with offensive services, including security analysts, security specialists, ...

Risks From Bring Your Own Device
By: Nihad Hassan
October 27, 2021

As digital technology continues to advance daily, the number of mobile computing devices is increasing steadily. According to Statista, the number of mobile devices operating worldwide has reached 15 billion in 2021, while this number is expected to reach 18.22 billion by 2025. People will utilize them to conduct most of their daily functions, including work functions (schedule meetings, check ...

How To Defend Against SQL Injection Attacks
By: Shimon Brathwaite
October 26, 2021

SQL injections are one of the most popular types of injection attacks for web applications. It affects roughly 25% of web applications, and it is relatively easy to perform. Due to this, developers need to understand how to defend against these types of attacks and proactively test their applications to see if they are vulnerable to attack. Here are our ...

Who Can Learn Ethical Hacking?
By: Divya Bora
October 26, 2021

Ethical Hacking Header WHAT IS ETHICAL HACKING? Hacking* is the process that involves searching for vulnerabilities in a system and using the vulnerabilities to gain unauthorized system access to perform malicious activities. Hacking is illegal and has dire consequences if someone has hacked a system illegally. Ethical hacking* is defined as an authorized attempt to gain unauthorized access to a system. ...

CompTIA Security+: Is Security Plus Easy?
By: Cybrary Staff
October 25, 2021

CompTIA Security+: Is Security+ an easy certification to obtain? Earning the CompTIA Security+ certification is not easy, but candidates can significantly increase their chances with ample preparation, including focused training. Summary: Like any other exam required to earn a professional accreditation, it is not easy to pass the CompTIA Security+ test. However, those capable of meeting the challenge will open the door ...

Cybersecurity Awareness - Cybersecurity Awareness Standards
By: Cybrary Staff
October 25, 2021

Cybersecurity Awareness Month– *Adhering to cybersecurity awareness standards With numerous standards and frameworks developed around security awareness and training, formulating the best strategy can be difficult.* Summary: With numerous standards, certifications, and frameworks developed to help counter today’s evolving cyber threat landscape, it can be difficult for business leaders to formulate a comprehensive training strategy. This guide explores some of the most ...

Does CEH Certification Expire?
By: Cybrary Staff
October 22, 2021

The Certified Ethical Hacker (CEH) certification from the EC-Council is a popular and highly regarded credential within the information security industry. Individuals who earn a CEH certification are dedicated, knowledgeable, ethical hackers. However, the process isn’t over after you receive the CEH credential. Every three years, you must renew your certification, and there are some requirements to do so. ...

What Are The Requirements For CEH?
By: Samia Oukemeni
October 22, 2021

Cybersecurity experts are increasingly sought-after nowadays, either Cybersecurity Analysts, Cybersecurity Consultants, or Cyber Security Manager. The main reason for this high demand is that cyberattacks have become so common that there is a cyberattack in the US every 39 seconds. Each attack can harm not only businesses but also millions of people. Another domain of sought-after cybersecurity experts is ethical hackers. ...

What Is Business Continuity Planning For Cyberattacks?
By: Shimon Brathwaite
October 21, 2021

A Business Continuity Plan (BCP) is about finding ways to maintain important business operations during an emergency. This can be an earthquake, hurricane, cyberattack, or any other type of unexpected situation. In these types of situations, preparation is key. If you don't have a plan before the emergency happens, you'll likely make bad decisions because of the stress and urgency ...