0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Burp Suite Tutorial Part 4: Getting Started With Burp Intruder
By: payloadartist
August 20, 2021

A brief overview of Burp Suite was given in the previous posts, including hotkeys to improve productivity, Burp Proxy, the request interceptor feature, and Burp Repeater. This post will focus on the core features of Burp Suite’s Intruder tool, which is very popular for brute-forcing and fuzzing web applications and APIs. Burp Intruder is useful in many auditing and ...

Best Privacy Browsers For User Privacy
By: Shimon Brathwaite
August 19, 2021

It is well known that both governments and corporations are collecting people’s information for profit. Therefore, user privacy is an important concern for many individuals. Programs such as the Fourteen Eyes Surveillance Alliance not only prove that there is a plan to gather information on everyday civilians, but it shows that it has been developed and ongoing for several years. ...

Data Science: The Path To Understand Where We Are And Will Go
By: Divya Bora
August 19, 2021

WHAT IS DATA SCIENCE? According to Wikipedia, Data science is an interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data and apply knowledge and actionable insights from data across a broad range of application domains. It relates to data mining, machine learning, and big data. DATA SCIENCE LIFECYCLE The ...

(Best CISSP Training) 5 Essential Considerations for Choosing the Best CISSP Training Solution (Best CISSP Training Topic Cluster)
By: Charles Owen-Jackson
August 18, 2021

Five essential considerations for choosing the best CISSP training solution Although many certifications are available in the cybersecurity field, becoming a certified information systems security professional is one of the best. There are few better ways to take a career in cybersecurity to the next level than becoming a certified information systems security professional (CISSP). According to ISC2, the accrediting organization, ...

What Is Big Data Security?
By: Nihad Hassan
August 18, 2021

Digital transformation is rushing to occupy all aspects of our lives. Organizations of all sizes and across all industries are utilizing digital solutions to store and process data. Nowadays', most data are created digitally and never find their way into papers. The volume of digital data is growing at an explosive rate and will reach an unprecedented size. According to ...

How To Detect Computer Viruses On Your Computer
By: Shimon Brathwaite
August 17, 2021

Computer viruses are the most popular word when it comes to internet safety. Everyone knows that you want to avoid getting a virus on a machine. If you get one, your machine can lead to your accounts getting hacked, which can have financial consequences. Also, from a cybersecurity perspective, the infection can have major consequences on a business if ...

Four Common Types Of Security Breaches And How To Mitigate Them
By: Nihad Hassan
August 17, 2021

The number of cyberattacks is increasing daily. The accelerated adoption of digital technology has shifted a significant portion of crime to cyberspace in all aspects of life. According to Cyber Security Ventures, the global cybercrime damage cost is projected to reach 10.5 trillion by 2025 annually. Nowadays, organizations of all sizes and across all industries utilize digital technology to simplify work ...

Digital Forensics: Quick Overview
By: Divya Bora
August 16, 2021

Digital Forensics is a branch of forensic science encompassing preservation, acquisition, documentation, analysis, and interpretation of evidence identified from various storage media types while preserving the integrity of the information and maintaining a strict chain of custody for the data. This includes data from computers, mobiles, and laptops, but it is not limited to just that. It also includes ...

How To Recover SQL Database Password-Quick Tricks Revision
By: Ashish Srivastava
August 16, 2021

Suppose you have ever lost a SQL database Password and want to know how to recover it. In that case, this article will provide all the possible successful ways for recovering the SQL server database user password. Microsoft has created SQL Server Management Studio (SQL Server), a Relational Database Management System (RDBMS). It is used to store SQL (Structured Query ...

Top Ethical Hacking Certifications For Getting Hired
By: Shimon Brathwaite
August 13, 2021

Ethical hacking is one of the most desired specialties in cybersecurity. Unfortunately, becoming a good hacker isn’t as simple as going to college or even enrolling in a cybersecurity Bootcamp. There isn’t too much valuable theory on being a good hacker; you need to get as much practical experience as you can. However, this leads to another problem, how do ...