0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Jobs Can You Get With A CISSP?
By: Prasanna Peshkar
June 29, 2021

Expert certifications are important in the cybersecurity world, where established skills and abilities are greatly needed. Because capacity requires more than work expertise to assure the candidate is thoroughly trained and can approach the latest technologies, threats, and challenges. One of these certifications is CISSP. Many big firms such as Google, IBM, P&G recognize and respect CISSP credentials. They usually ...

Reduce Authentication Alert Fatigue In Your Kibana Logs
By: Owen Dubiel
June 28, 2021

Authentication events can be confusing when you start receiving alerts for them, especially failed logins. Sometimes it can be hard to wrap your head around the idea of what a malicious actor would look like attempting a password spray attack on your network or a compromised account trying to move laterally. This article will look closely at what some of ...

Why Organizations Need Cyber Threat Intelligence
By: Nihad Hassan
June 28, 2021

Cyberattacks are on the rise in both numbers and sophistication. According to Cyber Security Ventures, the global costs of cybercrime will reach 10.05 trillion annually. The same study predicted that there would be a ransomware attack on businesses every 11 seconds by 2021. This number does not include the number of ransomware attacks against individuals, which is more significant than ...

How Is Machine Learning And AI Changing SIEM Technology?
By: Shimon Brathwaite
June 25, 2021

SIEM stands for security information and event management. It is a central hub for all of the security-related alerts within a company. Typically, An agent is installed on every machine on the network. It will monitor activity on that computer and send that information to a central repository where that information can be stored and analyzed. When a security admin logs ...

How to Detect Ryuk Ransomware with Qradar
By: Owen Dubiel
June 25, 2021

Ransomware is a scary topic to discuss in any enterprise. The thought of a malicious file that can encrypt and steal sensitive data is a terrifying outcome that could occur. The key to defeating Ransomware is identifying and eliminating it quickly. This article will review a particular type of Ransomware called Ryuk and some supporting details around how it works. ...

Mirai Claims IoT Devices With Weak Passwords
By: Gabriel Schram
June 24, 2021

The internet of things (IoT) is any device that can connect and share data with other devices through a connected network or internet connection. At the end of 2020, more than 20 billion connected devices (Sujay Vailshery, 2021). The IoT has been integrated into devices of all types and vastly applied to daily life and infrastructure. An increase in IoT ...

Everything You Need To Know About Password Cracking
By: Shimon Brathwaite
June 24, 2021

Password cracking is the art of getting someone's password without authorization. Passwords are the main line of defense for user accounts; if someone can retrieve your account password, they can quickly receive access to everything in that account. You can imagine the damage that can occur if someone does this to your bank account, work email, Gmail, or PayPal, to ...

Cybersecurity in Healthcare: Prominent Cyberthreats
By: Nihad Hassan
June 23, 2021

Cybersecurity in Healthcare: Prominent cyberthreats These days, organizations across all industries utilize digital solutions to facilitate work operations and communicate with customers and other business partners. Healthcare organizations are no exception to this fact. Technology has changed how healthcare organizations offer their services to the public. However, when talking about cyberattacks against hospitals and medical centers, we are concerned about the ...

Learn To Secure Identity Access Management In AWS
By: Vijay Maripi
June 23, 2021

IAM Overview In the world of IT Organizations, Identity and access management (IAM) refer to the process of creating and maintaining the access, roles, and privileges of particular network entities (users and electronic devices) concerning several cloud and on-premises services. Customers, partners, and workers are examples of users, while computers, routers, mobiles, servers, sensors, and controllers are examples of electronic ...

Diamonds Are An Analyst’s Best Friend
By: Page Glave
June 22, 2021

What is cyber threat intelligence? According to NIST, cyber threat intelligence is “threat information aggregated, transformed, analyzed, interpreted, or enriched to provide the necessary context for decision-making processes.” Threat intelligence is differentiated from threat information by being modified to be actionable. There is so much information available that cybersecurity professionals must move beyond threat information to threat intelligence. An understanding ...