0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ryuk Ransomware Is Continually Changing
By: Gabriel Schram
August 2, 2021

Ryuk is an identified variant of ransomware that started making its impact in 2018. Like most ransomware, this shuts down system processes and encrypts the entirety of its target. In exchange for some bitcoin, users can unlock and regain access to their system and its data. Since its discovery, Ryuk has caused millions in damages from big game hunting. *Big ...

By: Elviraluke Napwora
August 2, 2021

The rise of endpoint devices in the corporate environment has increased organizations' security risks as each device is a potential attack surface. To counter some of these challenges, an organization must implement an endpoint security strategy with the necessary tools, such as EDR. Endpoint Detection and Response (EDR) solutions provide an integrated view of the security of endpoint nodes through continuous ...

Sources, Motives and Targets of APT
By: Divya Bora
July 30, 2021

WHAT IS ADVANCED PERSISTENT THREAT (APT)? An advanced persistent threat is a prolonged and targeted cyberattack in which an intruder, or a group of intruders, establishes their illicit presence on a network to infiltrate and/or exfiltrate as much valuable data as possible without being discovered. WORKING OF APT An APT's life cycle is much longer and more complex than any other ...

How To Crack WPA/WPA2 Wi-Fi Passwords Using Aircrack-ng
By: Tejareddy
July 30, 2021

Aircrack-ng is a set of tools in Kali Linux that can be used to assess Wi-Fi network security. It is capable of monitoring (capturing packets), attacking, and cracking Wi-Fi networks. In this post, Aircrack-ng will be used to crack a password-protected WPA/WPA2 Wi-Fi network. Attack Prerequisites Kali Linux can be A) installed or B) used in the Live version through a ...

Data Privacy Good Privacy Governance and Controls
By: Muhammad Tariq Ahmed Khan
July 29, 2021

There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, addresses, contact details, marriage, and holiday plans on social media. People are also inclined to share pictures of favorite foods, people, localities, and workplaces, in addition to providing opinions on sensitive issues (religious, national, political, ...

Top 5 Intrusion Detection Systems
By: Nihad Hassan
July 29, 2021

As the digital transformation continues to move steadily, people become more dependent on technology. Nowadays, computerized systems are prevalent in all industries to manage resources and handle various business operations. Protecting these assets has become vital for the continued operations of any organization. Cyberthreats are evolving every day in terms of number and sophistication. Malicious actors are continuously looking for ...

What Is Regex And Why It's Important For Log Analysis?
By: Shimon Brathwaite
July 28, 2021

Regex stands for regular expressions, and it’s a means of searching a string of characters (text) for specific patterns. An easy way to understand this is the command “Ctrl + F” function on most computers. If you ever wanted to find a word in a long essay, you press command + F, and a small search box appears in the ...

Phishing Using Shellphish
By: gagan1999
July 28, 2021

What is a Phishing Attack? A Phishing Attack is a fraud that attempts to obtain sensitive information like usernames, Bank Account Numbers, credit card information, and passwords. Phishing is an example of a Social Engineering technique used to deceive users. The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target, leading ...

Zero Trust Networks
By: Samia Oukemeni
July 27, 2021

As the demand for the cloud environment and remote work is rising, enterprise security becomes more challenging than ever. Zero-Trust concepts bring a new solution to move network defenses from static on-premises security to dynamic, identity-based access control to resources and bring down traditional security walls. Network Security in the Age of COVID-19 The events of 2020 and the COVID-19 have ...

THC Hydra: Cracking Router's Admin Login Password Revision
By: bachan
July 27, 2021

What is THC Hydra? THC Hydra is a password-cracking tool that supports a wide range of network protocols like FTP, LDAP, most HTTP methods like GET and POST, databases like MySQL, and much more. These functions make it a handy tool for network penetration testing. When it comes to credential brute-force attacks, Hydra is one of the most widely used ...