0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Aligning Cyber Skills With The MITRE Framework: An Introduction
By: Cybrary Staff
February 4, 2022

How to align cyber skills with the MITRE ATT&CK Framework By encompassing the full lifecycle of cyberattacks, the MITRE ATT&CK framework helps security teams take an offensive stance in protecting their organizations. Summary: From conducting initial reconnaissance to compromising targets, the MITRE ATT&CK framework encompasses the entire lifecycle of cyberattacks. By aligning cybersecurity training with the framework, organizations can better protect themselves ...

Top Five IT Risk Management Software
By: Nihad Hassan
February 4, 2022

The continual advance in digital technologies has transformed most organizations' business processes to become digital. The introduction of IT solutions to businesses has brought many advantages, such as increased efficiency and productivity, improved customers engagement, reduced cost, open new markets, and facilities collaboration with third-parties vendors, to name only a few. Despite the great benefits of applying digital technology, its ...

Incident Response: Benefits and Why Your Company Should Have A Plan
By: Divya Bora
February 3, 2022

header WHAT IS INCIDENT RESPONSE? Incident Response is defined as the process used by an organization to control and respond to a cyberattack like data breaches and leaks. It also consists of ways to manage the damage or consequences. It aims to effectively manage the damage caused by the incident to the organization. In addition, it takes care of other essential ...

What Is The MITRE Framework, and Why Does It Matter?
By: Cybrary Staff
February 2, 2022

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework is a curated knowledge base for cybersecurity professionals. Summary: As businesses take a more offensive stance against cyberattacks, there is a growing emphasis on documenting and emulating adversarial behavior. As a curated knowledge base and model for cyber behavior, the MITRE ATT&CK framework is being widely adopted to enhance intrusion detection ...

A Guide To CTFs For A Cybersecurity Analyst
By: Shimon Brathwaite
February 1, 2022

Cybersecurity analyst is one of the most common types of cybersecurity jobs, and they fall into two categories. There are blue teams (defensive) and red teams (offensive) security analysts. The first one works primarily to defend the system by resolving security vulnerabilities, while the other discovers security vulnerabilities by attacking computer systems. Now you can learn a lot about doing ...

Everything You Need To Know About Malware Threats
By: Prasanna Peshkar
January 31, 2022

Malware is a type of computer program or software developed to cause damage to the computer. It is also called malicious software, which can harm files, swipe private data, and more. This article will discuss Malware and different types of malware threats. The rise of computer and internet technology has transformed our lives, and it has changed the course of ...

High-Profile Cyber Events Of 2021
By: Cybrary Staff
January 28, 2022

The year in review: A look back at some high-profile cyber events of 2021 Like the year before, 2021 was a record-breaking year for cyber events, with billions of records being compromised. Here are some of the most prominent incidents. Summary: By September 2021, the number of data breaches had already exceeded the total number of those from the year before, with ...

How Attackers Use MSHTML For Remote Code Execution
By: Vijay Maripi
January 27, 2022

Overview of MSHTML Vulnerability MSHTML is an acronym for Microsoft HTML Engine and interfaces, and this is a browser engine that comes with Windows, both personal computers and servers. The security flaw can be found in almost any device that runs with Windows operating system. The CVE-2021-40444, also known as the MSHTML Engine Remote Code Execution vulnerability, allows attackers to execute ...

How To Learn Ethical Hacking On My Own
By: Nihad Hassan
January 26, 2022

The advancement of computing technologies and the proliferation of the internet worldwide have shifted a significant part of people's daily lives into cyberspace. Organizations of all types and sizes increasingly utilize digital technologies to conduct and support most of their work operations. The massive shift to cyberspace has brought numerous benefits for individuals and organizations, but it also introduced serious ...

Best Algorithms For Encryption Of Your Data
By: Shimon Brathwaite
January 25, 2022

Encryption is one of the most important aspects of securing online communications. It is easier than you might think for someone to eavesdrop on a conversation or access data while it is in transit from one place to another. Encryption is simply the process of encoding information so that the original message cannot be understood until it has been decrypted. ...