0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



In my last blog post, I discussed the basics of Cross-Site Scripting (XSS). For this post, we will be discussing the basics of SQL Injections (SQLI). This post will cover what SQL is, what SQLI is, identify it, and exploit it. First, let's discuss what SQL is. SQL stands for Structured Query Language and is used to store, manipulate, and ...


In this world of cyberlearning, brick and mortar schools and hybrids schools. It is tough to nail it down. It goes back to what I have stated many times before. Brick & Mortar schools will take much longer when compared to online. To watch all the IoT training videos on YouTube will take six weeks to two months. At least ...


Unpacking the Interview: Information Security Fundamentals Companies are dealing with a massive uptick in cyberattack vectors — the second quarter of 2020 alone saw massive spikes in Powershell and mobile malware attacks, while familiar threats such as phishing continue to plague corporations' email accounts. The result is an infosec landscape that requires the skill and insight of trained and certified information ...


February Free Courses Launch Today! Each month, since July 2020, we have offered a carefully currated set of courses completely free. As "New Year, New You" fades into the background we aim to help you maintain the mindset of continuous learning and meet the cybersecurity industry’s need for skilled professionals. Make 2021 your year for career growth with our most ...


Code signing is defined as a process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. Code signing certificate software helps digitally sign data that is available online and plays a crucial role in preventing third party access while downloading software online. TYPES OF ...


Autonomous vehicles (AV) are becoming mainstream in our society. Globally there's an ongoing development and testing of autonomous vehicles in several countries, setting the stage for widespread adoption of self-driving cars. It is projected that, by 2025, there will be 8 million autonomous or semi-autonomous vehicles on the road, and by 2030, more than 18 million. The estimated autonomous vehicle ...


Microsoft Outlook is one of the most popular email client software. The reputation of Outlook can be mainly attributed to its easy-to-use graphical interface and up-to-date security enhancements. Connectivity with other advanced technologies makes Microsoft Outlook stand out in the crowd against other email clients. However, the ease and complexity are indirectly proportional to each other in the technological fields. ...


Heading into 2021, organizations may be searching for better methods to manage and reduce their company's cybersecurity protection challenges, which may involve using industry-specific cybersecurity assessment tools. The question is, "Where to start?" The answer is to customize the current cyber-risk assessment tool by integrating it with the National Institute for Standards and Technology Cybersecurity Framework (NIST CSF). This article ...


DES (Data Encryption Standard)DES: DES is a symmetric-key block cipher adopted in 1977 by the National Institute of Standards and Technology(NIST) and was initially created by an IBM team. Symmetric indicates that the cipher will use the same key to encrypt or decrypt the given input data & block indicates that the cipher will take a fixed-sized block as an ...


IT security management is critical for operational success — regardless of industry, market, or vertical. For any organization with lingering doubts, the pandemic pressures of 2020 have made this protective priority crystal clear. As noted by GovTech, this year saw not only the highest number of records ever breached but also a substantive uptick in ransomware efforts as attackers looked to ...