0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Beginner's Guide To Zero Trust
By: Elviraluke Napwora
July 16, 2021

A BRIEF HISTORY; THE JOURNEY TO ZERO TRUST SECURITY In the recent past, security models were envisioned as "inside means trusted" and "outside means untrusted." However, in today's multifaceted and dynamic environment, and with networks consisting of mobile technologies, remote access/VPN use, cloud environment, etc., the perimeter-based approach becomes an inherent drawback in managing security because it grants excessive ...

Encryption For Data At Rest
By: Staford Titus S
July 16, 2021

Prelude A star-scanted, gloomy night sky, an eerie haze over the stone-paved streets, and tall tales of witchcraft and black magic just about summed up Mortem Town's actuality. A secluded, quaint old manor, atop the Phantom Hill overlooking the cove's ghastly-gleaming waters unsettled only by the treacherous rocks below, was the town's prime attraction! Coming to think of it, it ...

Poweshell Scripts: Useful Features
By: Divya Bora
July 15, 2021

Windows Powershell is an object-oriented automation engine and scripting language designed mainly for IT professionals and system administrators to control and automate Windows administration and other applications. It also provides new concepts to enhance the knowledge and scripts within the Windows command prompt. It is a perfect combination of flexible scripting, command-line speed, and a powerful GUI-based admin tool. ...

Introduction to SOAR
By: Nihad Hassan
July 15, 2021

As the world rushes towards complete digitalization, cyberattacks are increasing at an equal speed. According to Cyber Security Ventures, the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. Cyberattacks are accelerating in both number and sophistication, and cybercriminals are always in a pursuit to apply new attack techniques to infiltrate the most protected networks. Organizations of ...

Gsuite Logging Details
By: Owen Dubiel
July 14, 2021

Gsuite is widely used as both a professional and personal online computing source. Google is considered one of the biggest three competitors in the race for cloud domination. Google Cloud offers a wide range of tools, resources, and applications to help make day-to-day work life as stress-free and productive as possible. From a security standpoint, you must have proper visibility ...

The Importance Of Powershell For Ethical Hacking
By: Shimon Brathwaite
July 14, 2021

Powershell scripting is a scripting tool for automating almost any task in the windows operating system. Powershell is a more advanced version of the command prompt (CMD). It can be used to look at the processes running on Windows systems, start and stop processes, interact with files, and much more. Using PowerShell, you can do everything that CMD can do ...

Fuzz Testing
By: Gabriel Schram
July 13, 2021

The complexity of vulnerability testing for software is expanding with the advancement of connected systems. One of the most effective methods to find vulnerabilities in software is fuzz testing. Fuzz testing, also called fuzzing, is a process meant to find bugs in software through various or semi-random types of input. Specifically, a fuzz test will provide unexpected input to an ...

SASE
By: Samia Oukemeni
July 13, 2021

Organizations seek to accelerate growth in an era of rapid change and adapt quickly to the IT ecosystem's demands. With a shift towards the Cloud, security and access controls are moving outside the traditional enterprise perimeter. As a response to these demands, Gartner Inc. introduced a new enterprise networking technology, Secure Access Service Edge or SASE (pronounced Sassy), to solve ...

Part 3: Using Burp Suite Repeater More Efficiently
By: payloadartist
July 12, 2021

The Burp Repeater is a very powerful tool within Burp Suite. It allows pentesters to repeat requests through Burp Proxy, modifying, manipulating, and re-running them. It is a tool that one cannot live without if they are into web app security testing with Burp Suite, so being familiar with it is important. What is the use of Burp Repeater? Burp Repeater ...

Career Paths For Cybersecurity In 2021
By: Shimon Brathwaite
July 12, 2021

Cybersecurity has become one of the most profitable and growing industries of the 21st Century. Globally there are about 3.5 million unfilled cybersecurity jobs, which means there's tons of opportunity for people to make a living within this field. Many people don't understand what a career in cybersecurity is like, making it a difficult industry to break into. Cybersecurity is ...