0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Zero Trust Networks
By: Samia Oukemeni
July 27, 2021

As the demand for the cloud environment and remote work is rising, enterprise security becomes more challenging than ever. Zero-Trust concepts bring a new solution to move network defenses from static on-premises security to dynamic, identity-based access control to resources and bring down traditional security walls. Network Security in the Age of COVID-19 The events of 2020 and the COVID-19 have ...

THC Hydra: Cracking Router's Admin Login Password Revision
By: bachan
July 27, 2021

What is THC Hydra? THC Hydra is a password-cracking tool that supports a wide range of network protocols like FTP, LDAP, most HTTP methods like GET and POST, databases like MySQL, and much more. These functions make it a handy tool for network penetration testing. When it comes to credential brute-force attacks, Hydra is one of the most widely used ...

What Is Okta Advanced Server Access
By: Owen Dubiel
July 26, 2021

Oktas ASA (Advanced Server Access) is the necessary next step into properly securing both cloud and on-premise assets. Gone are the days of just securing the network perimeter; that network boundary has now expanded to the cloud. Symmetrically controlling access to all assets is essential to maintaining any enterprise's overall security posture. On top of effectively providing access centrally, it ...

The Effect Of COVID-19 On Secure Online Transactions
By: Nihad Hassan
July 26, 2021

The ongoing COVID-19 crisis has significantly changed how people live, work, and interact with each other. For instance, the massive shift of the workforce to remote working (from home) and enforcing social distancing policy by governments worldwide have impacted consumer buying habits during the pandemic and possibly forever. Using internet technologies to work, study, socialize, and buy products and services ...

The What, Why, And Who Of Threat Intelligence
By: Prasanna Peshkar
July 23, 2021

In the world of cybersecurity, the ability to predict imminent attacks even before they enter targeted networks can assist companies in prioritizing their responses and speed up the decision-making method and response period, giving better security collectively. This is why cyber threat intelligence was launched. Unknown enemies have seemingly unlimited resources, putting stress on security leaders to constantly evaluate every phase ...

The Importance Of Javascript For Web App Hacking
By: Shimon Brathwaite
July 23, 2021

Javascript has become a popular language in the 21st century. There are roughly 1.6 billion websites globally, and over 95% of them (1.52 billion websites) used Javascript. It is widely used for developing web applications, especially the front-end aspect that focuses on aesthetics and animations. If you are interested in hacking web applications, it is highly advisable to learn Javascript ...

Hacking As A Service
By: Gabriel Schram
July 22, 2021

Skilled cybercriminals take part in dark web markets by offering their skills to those willing to pay; this is considered hacking-as-a-service (HaaS). Not to be confused with penetration testing, HaaS is typically associated with illegal activity hosted by dark market web users. One reason HaaS markets have been able to establish themselves is the advancement of open-source hacking tools. There ...

Data Retention Policy
By: Nihad Hassan
July 22, 2021

The world is moving increasingly into becoming fully digital. People are increasingly utilizing technology in all aspects of their lives, from work to study, socializing, entertainment, online communications, shopping, and online banking, to name a few. Today, most data are created digitally and are never printed on paper. As digital technologies advance, we can expect massive amounts of data to ...

Using Forescout To Solidify Network Boundaries
By: Owen Dubiel
July 21, 2021

Forescout makes Network Access Control (NAC) a breeze with its intuitive rule sets and the ability to create custom enforcement policies as granular as needed. This article will dive into some best features within the Forescout NAC solution that should be enforced to help strengthen an internal network from external threats. Threats may be lurking on employee assets or even ...

Top Kali Linux Tools For Ethical Hacking
By: Shimon Brathwaite
July 21, 2021

Kali Linux is one of the best Linux distributions for ethical hacking. The fact that it is open-source and accessible to users is a big reason. Still, the major draw is that Kali Linux comes pre-installed with all of the hacking tools a professional cybersecurity needs. Kali Linux makes this easy by preparing most of the top software applications in ...