0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Dependency Confusion - A New Supply Chain Attack Technique
By: payloadartist
May 24, 2021

Supply chain attacks are not new to the industry. They have been used in several high-profile breaches across. Supply chain attacks target less secure parts of an organization's supply chain to breach them. A Brief History of Supply Chain attacks The SolarWinds breach led to the compromise of various government and cybersecurity agencies due to a sophisticated supply chain attack. It ...

How To Become A Software Developer
By: Cami Ragano
May 21, 2021

Software development is an exciting and in-demand career in the IT industry. Many developer roles are available for qualified professionals, and opportunities continue to grow as technology advances. Students will learn to develop, create, maintain, and write or code new (or modify existing) software, applications, or specialized utility programs on this career path. With Cybrary's subject matter expert instructors, virtual ...

Security In The Cloud
By: Makeia Jackson
May 21, 2021

Public cloud usage is accelerating, and as businesses move their infrastructure and services to the cloud, many take advantage of a hybrid or multi-cloud approach. When companies utilize a hybrid or multi-cloud strategy, they decide to use different cloud services from various providers, such as Amazon Web Service (AWS), Microsoft Azure, or Google Cloud Platform (GCP), to name a few. ...

What is Multicloud?
By: Nihad Hassan
May 20, 2021

As the world rushes to adopt digital transformation in all aspects of life, organizations of all sizes and across all sectors are now leveraging digital solutions to run their operations and increase productivity. Since the start of the COVID-19 pandemic, the world has witnessed a massive shift in adopting the remote work model. Organizations have implemented this model to remain ...

Advanced Evimetry Forensic Acquisition: Allocated, Non-Linear Partial, and Live Images Course Review
By: Hugh Shepherd
May 20, 2021

In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, discusses advanced forms of disk imaging using Evimetry. As mentioned in the course lecture, advanced forms of disk imaging are extremely beneficial in cases where the forensic process will not require a full disk image. Also, it is useful in situations where only certain file types will be ...

Detecting The Infamous LokiBot Malware Virus
By: Owen Dubiel
May 19, 2021

LokiBot is a nasty little malware virus that continues to advance as it ages. Lokibot is known for being an advanced credential and crypto-wallet stealer. This malware virus has been observed in several different industries and continues to refine and change its techniques. It was first seen in 2015 and has had over 12 confirmed mainstream appearances since then. Disgusting ...

What is SIEM? Security Solutions and Other Functions
By: Nihad Hassan
May 19, 2021

The digital revolution is changing everything around us. Nowadays, people utilize the internet to work, study, socialize, shop, bank, and relax, to name a few. In the business world, the internet significantly changed how companies bought, sold, interacted, and more. The concept of digital transformation is becoming more widely adopted after being a hot-debated topic for years. With the ongoing ...

Top Three UTM Solutions
By: Nihad Hassan
May 18, 2021

In today's Information Age, organizations heavily depend on digital technology to store and process their data. Most information is now created digitally and never finds its way to paper. The increased dependence on technology has resulted in shifting major criminal activities from the physical world into what is now known as Cyberspace. Cyberattacks are advancing in both sophistication and number. Global ...

Privacy Program Management Course Review
By: Shimon Brathwaite
May 14, 2021

What is The Privacy Program Management course? A privacy program is a set of standards used to define, maintain, and implement policies and procedures that allow for effective information privacy practices. It is essential for any organization that collects or processes sensitive data on paper or electronically. The need to understand privacy has increased over the years as more ...

Keeping Safe From Cybercriminals When Making Online Transactions
By: Nihad Hassan
May 14, 2021

As the digital transformation continues steadily to enter all life aspects, a growing number of internet users are choosing to purchase products/services and pay their bills online. Since the start of the COVID19 pandemic, the world has witnessed a massive increase in digital technology adoption in work, study, life, entertainment, and social activities. For instance, a survey - of about ...