0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Machine learning (ML) has been developed at an amazing speed over the past few years. It has led to transformational fields and introduced new capabilities. Machine learning algorithms have been used in different emerging applications that impact and will impact society in the years to come, such as self-driving cars, speech recognition, data analytics, sentiment analysis, and robotics, to name ...


Ryuk is an identified variant of ransomware that started making its impact in 2018. Like most ransomware, this shuts down system processes and encrypts the entirety of its target. In exchange for some bitcoin, users can unlock and regain access to their system and its data. Since its discovery, Ryuk has caused millions in damages from big game hunting. *Big ...


The rise of endpoint devices in the corporate environment has increased organizations' security risks as each device is a potential attack surface. To counter some of these challenges, an organization must implement an endpoint security strategy with the necessary tools, such as EDR. Endpoint Detection and Response (EDR) solutions provide an integrated view of the security of endpoint nodes through continuous ...


WHAT IS ADVANCED PERSISTENT THREAT (APT)? An advanced persistent threat is a prolonged and targeted cyberattack in which an intruder, or a group of intruders, establishes their illicit presence on a network to infiltrate and/or exfiltrate as much valuable data as possible without being discovered. WORKING OF APT An APT's life cycle is much longer and more complex than any other ...


Aircrack-ng is a set of tools in Kali Linux that can be used to assess Wi-Fi network security. It is capable of monitoring (capturing packets), attacking, and cracking Wi-Fi networks. In this post, Aircrack-ng will be used to crack a password-protected WPA/WPA2 Wi-Fi network. Attack Prerequisites Kali Linux can be A) installed or B) used in the Live version through a ...


There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, addresses, contact details, marriage, and holiday plans on social media. People are also inclined to share pictures of favorite foods, people, localities, and workplaces, in addition to providing opinions on sensitive issues (religious, national, political, ...


As the digital transformation continues to move steadily, people become more dependent on technology. Nowadays, computerized systems are prevalent in all industries to manage resources and handle various business operations. Protecting these assets has become vital for the continued operations of any organization. Cyberthreats are evolving every day in terms of number and sophistication. Malicious actors are continuously looking for ...


Regex stands for regular expressions, and it’s a means of searching a string of characters (text) for specific patterns. An easy way to understand this is the command “Ctrl + F” function on most computers. If you ever wanted to find a word in a long essay, you press command + F, and a small search box appears in the ...


What is a Phishing Attack? A Phishing Attack is a fraud that attempts to obtain sensitive information like usernames, Bank Account Numbers, credit card information, and passwords. Phishing is an example of a Social Engineering technique used to deceive users. The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target, leading ...


As the demand for the cloud environment and remote work is rising, enterprise security becomes more challenging than ever. Zero-Trust concepts bring a new solution to move network defenses from static on-premises security to dynamic, identity-based access control to resources and bring down traditional security walls. Network Security in the Age of COVID-19 The events of 2020 and the COVID-19 have ...