0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


The new wave of the internet is among us. We are now in the era of the “Internet of things," (IoT) sensors and devices that connect to the internet from your home IP. Does your fridge have a computer component that tells you the weather? What about a fridge that can connect to your mobile phone ...


The purpose of this article is to demonstrate an analytic maturity model through which cyber security experts/institutions can assess their progress in the use of user behavioral analytics to forge the thorough scrutiny in applying security postures that safeguard confidentiality, integrity and the availability of data to the right user primarily eliminating nuance. ...


Ransomware viruses have become a popular tool used by cyber criminals to exploit their victims. Once the ransomware virus finds its way into your computer it encrypts all the data on the PC, and if you want your data decrypted you are required to pay a certain amount of money via Bitcoin.Cyber criminals have now moved their focus to ...


We have seen it time and time again, DDoS attacks against organizations causing network interruptions and downtime. (What else is new?) These Organizations at times are hopeless at the hands of the attackers sometimes even for ransom. Think of a small or medium business with a 50Mbps internet connection that is getting attacked. What options ...


Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list. What is the bogon list? The bogon list is a list of IP subnets that are either invalid non-routable IP blocks such as 192.168.0.0, ...


Welcome Back! As you are all aware of the facts surrounding the ransomware attacks, they are increasing rapidly from past years. Consider the biggest hits till now, you will come across these well-known names i.e. 1. CryptXXX 2. Dogspectus 3. Crypto Locker 4. Petya 5. Cerber ...


Hackers! One of the most mysterious words in the dictionary. They seek for justice in an unjustified way. They are the guardians of the internet. They are everywhere, on every computer, on every network. Who are they? What do they want? What is their motive? Let’s find out here.Nowadays, we live in two different worlds at the same time. ...


Construction Delays An Introduction I consider the construction delay as the utmost charged because it is the big obstacle that interrupts the construction projects and affects their progress. To understand the delay issue and handle its consequences, it is crucial that we investigate its ...


Types of Contracts At the early stage of the construction projects, the essential argument that disturbs the owner and contractor is accepting a suitable form of the contract that meets the common objectives. (Elbeltagi, 2009). Specifying the suitable form of the contract is the first step to confirm the ...


The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to Russia, attacking the regional departments of the Ministry of Internal Affairs and the Investigative Committee.Kaspersky reports that tens of thousands of computers in 74 countries ...