0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Is PII Data And How To Secure It?
By: Nihad Hassan
August 10, 2021

As society continues to digitize rapidly, technology has become integrated into our everyday lives, from work, study, and reaching to entertainment. Technology has made people's lives easier and more productive. The proliferation of internet technology and the spread of cheap computing devices such as smartphones and tablets will undoubtedly boost technology adoption among the public worldwide. According to Statista, in January ...

Mobile OWASP Top 10
By: Divya Bora
August 10, 2021

owasp header Some might not be aware of what the OWASP Foundation is. The Open Web Application Security Project (OWASP) is a non-profit, international, community-led, open-source software project with tens of thousands of members working to improve software security. It acts as a source for developers and technologists to secure web and mobile applications. What is OWASP Mobile Top 10? The OWASP ...

How To Get CISA Certified?
By: Prasanna Peshkar
August 9, 2021

Certifications are crucial to the career of cybersecurity experts. Several certifications give experience and skills for different specializations. As such, certifications enable a security expert to get the skills needed to concentrate in a special domain. Moreover, one must pass multiple exams before being certified for completion. Certifications, therefore, help to confirm the awareness and skills gained when finishing a cybersecurity ...

10 Most Dangerous Types Of Computer Viruses
By: Shimon Brathwaite
August 9, 2021

Computer viruses are by far the most popular type of malware within cybersecurity. Simply put, a computer virus is a type of malware that spreads by infecting a legitimate computer program. Almost everyone has had a computer virus at some point in time, and it’s well known that it can do a lot of damage to your computer. However, not ...

Best Encryption Software To Use In 2021
By: Nihad Hassan
August 6, 2021

As the world moves steadily towards adopting digital technology in all life aspects, people's dependence on digital solutions to work, study, entertainment, socialize, shopping, and online communications increases. Nowadays, most data are created digitally, not on paper. The rapid shift from the physical world into cyberspace has resulted in an equal increase in cybercrime. Adversaries are present everywhere in cyberspace, ...

Using the CUPP Tool to Generate Powerful Password Lists
By: doctorX
August 6, 2021

This post covers CUPP (The Common User Password Profiler), which is a wordlist generator. It can be used to generate custom wordlists for the red team and pentesting engagements. About CUPP CUPP is a powerful tool for generating a wordlist for brute force attacks. It's written in Python and hence cross-compatible with almost any platform capable of running Python scripts. ...

10 Tips For Defending Against Password Cracking
By: Shimon Brathwaite
August 5, 2021

Password cracking refers to using various methods to discover computer passwords. In some situations, this may be legal, such as when someone forgets the password to their computer or USB, but many times it's used by computer hackers to get access to accounts or machines that don't belong to them. Since password-based attacks are a lot less complicated than other ...

Hacking a WiFi Network with MAC Filtering Enabled
By: Rana Daniyal Khan
August 5, 2021

In this tutorial, we will learn how to hack into a WiFi network that has MAC filtering enabled. The Media Access Control (MAC) address is a 48-bit unique identifier assigned to all the network interfaces for their identification. Most routers provide a security option called MAC Filtering, also known as MAC Whitelist or Blacklist. This method allows the network administrator ...

Sumo Logic Integrations Are Seamless
By: Owen Dubiel
August 4, 2021

Sumo Logic is one of the world-leading SIEM solutions for innovation and advancement. They specialize in ingesting any data (no matter the industry) and making sense of it due to their various built-in integrations that make data ingestion a breeze. This article will delve into some ways Sumo Logic makes utilizing their platform within any environment convenient and easy. Partnering ...

Starwars In CMD
By: sourajeet
August 4, 2021

“Star Wars” was a movie that was watched and loved by many people. Telnet is a connection method that allows character-based terminals to communicate with a remote server using text-based command-oriented terminal sessions. Here is how we can view a version of “Star Wars,” which is entirely rendered in ASCII characters using the Command Prompt on Windows or Terminal on ...