0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


WHAT IS PRIVILEGED ACCESS MANAGEMENT? Privilege Access Management(PAM) is considered a combination of technology and tools used to control, secure, and monitor access to an organization's critical resources and information. PAM includes various strategies like application access management, privileged session management, vendor privileged access management, and shared access password management. PAM aims to minimize the attack surface and prevent ...


Migrating from Exchange online to Office 365 requires proper planning and management. Having the Exchange mailbox data on a cloud platform like Office 365 has several advantages like quick data access and no downtime maintenance. Most users prefer to keep a copy of it on Office 365 as it is a reliable platform to move their offline Outlook Data File(OST). When ...


Web application testing is an important part of developing secure software applications. When creating an application, the first and most important procedure is using secure coding practices. These help to limit the number of vulnerabilities that an application may have. However, one won’t know how secure the code is until it’s been tested. Many people think that one must do ...


What are the biggest benefits of earning a CISSP certification? The CISSP credential is one of the most coveted in the information security space. Certificate holders can expect better job opportunities and much more. The certified information systems security professional (CISSP) accreditation demonstrates a high level of expertise across all of the major domains of cybersecurity. It requires four or five ...


As society continues to digitize rapidly, technology has become integrated into our everyday lives, from work, study, and reaching to entertainment. Technology has made people's lives easier and more productive. The proliferation of internet technology and the spread of cheap computing devices such as smartphones and tablets will undoubtedly boost technology adoption among the public worldwide. According to Statista, in January ...


owasp header Some might not be aware of what the OWASP Foundation is. The Open Web Application Security Project (OWASP) is a non-profit, international, community-led, open-source software project with tens of thousands of members working to improve software security. It acts as a source for developers and technologists to secure web and mobile applications. What is OWASP Mobile Top 10? The OWASP ...


Certifications are crucial to the career of cybersecurity experts. Several certifications give experience and skills for different specializations. As such, certifications enable a security expert to get the skills needed to concentrate in a special domain. Moreover, one must pass multiple exams before being certified for completion. Certifications, therefore, help to confirm the awareness and skills gained when finishing a cybersecurity ...


Computer viruses are by far the most popular type of malware within cybersecurity. Simply put, a computer virus is a type of malware that spreads by infecting a legitimate computer program. Almost everyone has had a computer virus at some point in time, and it’s well known that it can do a lot of damage to your computer. However, not ...


As the world moves steadily towards adopting digital technology in all life aspects, people's dependence on digital solutions to work, study, entertainment, socialize, shopping, and online communications increases. Nowadays, most data are created digitally, not on paper. The rapid shift from the physical world into cyberspace has resulted in an equal increase in cybercrime. Adversaries are present everywhere in cyberspace, ...


This post covers CUPP (The Common User Password Profiler), which is a wordlist generator. It can be used to generate custom wordlists for the red team and pentesting engagements. About CUPP CUPP is a powerful tool for generating a wordlist for brute force attacks. It's written in Python and hence cross-compatible with almost any platform capable of running Python scripts. ...