0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Typosquatting Leads To User Compromise
By: Gabriel Schram
July 9, 2021

Cybercriminals are taking advantage of user error through active social engineering campaigns and imposter websites. Typosquatting, also called URL hijacking, is an attack centered around a fake and malicious website. These URLs often look similar to popular websites, for example, gogle.com instead of google.com. Threat actors take advantage of a user misspelling the legitimate site in hopes that they go ...

Is It The End Of Firewalls As We Know Them?
By: Samia Oukemeni
July 9, 2021

If you ask any laptop user what a firewall is, there is a good chance that they will give a reasonably accurate answer, even if they aren't techies. The fiery orange wall with bricks, represented in any network design, is neither a new technology nor an unfamiliar innovation. So, how come we are still talking about firewalls and trying to ...

What is MSSP?
By: Nihad Hassan
July 9, 2021

As the world moves steadily to become fully digital, organizations of all sizes and across all business sectors utilize digital technology to facilitate work operations and communicate with customers and other business partners. Cybercriminals have ridden the digital wave and shifted most of their criminal activities to cyberspace. According to Cyber Security Ventures, cybercrime's global damage is projected to reach ...

What Skills A Threat Intelligence Analyst Needs To Have
By: Nihad Hassan
July 8, 2021

The number of cyberattacks is increasing rapidly; every day, we hear about a data breach or security incident. The accelerated digitalization of our society has led to an equal increase in cyberattacks. To protect precious data assets, organizations of all sizes and across all industries deploy various security solutions such as Firewalls and IPS/IDS. However, the human element remains the ...

The Importance Of Bash Scripting For Ethical Hacking
By: Shimon Brathwaite
July 8, 2021

Bash is the common-line language of Unix-based operating systems, including Mac OS and Linux. As a Cybersecurity professional, you often work in Linux environments, and you must understand the common bash commands to navigate the operating system properly. Several tools, such as Nmap or Metasploit, are command-line applications, meaning that they don't have a graphical user interface (GUI). Therefore, you ...

Best SIEM For Security And Requirements For PCI Compliance
By: Owen Dubiel
July 7, 2021

It can be troublesome to satisfy security and compliance, especially if Payment Card Industry Data Security Standard (PCI DSS) is a compliance framework that must be met. One of the more unique requirements for PCI compliance includes having a logging solution to carry out a slew of controls. These controls must be tested annually to achieve PCI certification. Some of ...

10 Tips For Compliance With GDPR
By: Shimon Brathwaite
July 7, 2021

GDPR stands for General Data Protection Regulation, and it’s a privacy law created by the European Union (EU) that has become effective as of May 25th, 2018. GDPR was designed in response to a need for more significant data privacy protection for citizens of the European Union. As the internet has become more popular, statistics say that every day 2.5 ...

The Vulnerability Management Program And Its Role In Mitigating Cyberattacks
By: Nihad Hassan
July 6, 2021

Information has become the most critical asset in an organization. This results in increasing the importance of cybersecurity. Organizations of all sizes and across all industries thrive to protect their data from various risks originating from cyberspace. The recent rise of remote working models has increased the number of security vulnerabilities that organizations need to handle due to employee endpoint ...

The Pillars of AWS Security Best Practices
By: Owen Dubiel
July 6, 2021

There's no denying that AWS and cloud computing are the future of business as well know it. Therefore, it will be essential that all organizations utilizing AWS for business operations consider the risk implications of expanding their network to the cloud. Luckily, it has our backs and has created a well-structured guide of security controls to protect all facets of ...

Data Centers Checklist
By: Nihad Hassan
July 1, 2021

Organizations of all sizes and across all industries opt to utilize digital technology to improve productivity, increase revenue and enhance customer stratifications. The utilization of digital solutions has led to increasing the volume of digital data. To benefit from this data, you need to have reliable solutions that allow for easy access and at the same time protect stored data ...