0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Career Paths In A SOC
By: Shimon Brathwaite
May 26, 2021

Security Operation Centers (SOCs) is the central unit that handles all security issues on an organization level. SOCs receive alerts from all the SIEMs and other security monitoring tools that an organization has in place and analyzes those alerts to determine what is going on within the company network. It is a great place to begin your cybersecurity career because ...

Cybersecurity Controls Checklist
By: Charlie Crane
May 25, 2021

Building a robust cybersecurity program often feels like an impossible task. This feeling can be caused by complex enterprise environments, company politics, vendor scaremongering, and jargon-packed marketing material that promises to provide you the silver bullet for the next-gen fileless malware. It doesn't have to be this way. If we boil cybersecurity breaches down and peel away the marketing, we find ...

Explore The Top Four DevOps Tools
By: Nihad Hassan
May 25, 2021

As the world moves steadily to become fully digital, organizations of all sizes and across all industries utilize digital solutions to facilitate work operations and communicate with customers. The rapid pace at which the IT industry advances raises many challenges for organizations, especially when developing IT solutions to enhance digital transformation efforts. DevOps is a set of philosophies, tools, and practices ...

Security Awareness
By: Darcy Kempa
May 24, 2021

One of the best security measures for any organization is to improve employee security awareness. This is because an organization can enhance its cybersecurity team's efforts by educating and engaging all employees. This way, the employees can help reduce risky behavior, report suspicious emails or activities, and improve an organization's cybersecurity posture at little to no, additional cost. Develop Interactive ...

Dependency Confusion - A New Supply Chain Attack Technique
By: payloadartist
May 24, 2021

Supply chain attacks are not new to the industry. They have been used in several high-profile breaches across. Supply chain attacks target less secure parts of an organization's supply chain to breach them. A Brief History of Supply Chain attacks The SolarWinds breach led to the compromise of various government and cybersecurity agencies due to a sophisticated supply chain attack. It ...

How To Become A Software Developer
By: Cami Ragano
May 21, 2021

Software development is an exciting and in-demand career in the IT industry. Many developer roles are available for qualified professionals, and opportunities continue to grow as technology advances. Students will learn to develop, create, maintain, and write or code new (or modify existing) software, applications, or specialized utility programs on this career path. With Cybrary's subject matter expert instructors, virtual ...

Security In The Cloud
By: Makeia Jackson
May 21, 2021

Public cloud usage is accelerating, and as businesses move their infrastructure and services to the cloud, many take advantage of a hybrid or multi-cloud approach. When companies utilize a hybrid or multi-cloud strategy, they decide to use different cloud services from various providers, such as Amazon Web Service (AWS), Microsoft Azure, or Google Cloud Platform (GCP), to name a few. ...

What is Multicloud?
By: Nihad Hassan
May 20, 2021

As the world rushes to adopt digital transformation in all aspects of life, organizations of all sizes and across all sectors are now leveraging digital solutions to run their operations and increase productivity. Since the start of the COVID-19 pandemic, the world has witnessed a massive shift in adopting the remote work model. Organizations have implemented this model to remain ...

Advanced Evimetry Forensic Acquisition: Allocated, Non-Linear Partial, and Live Images Course Review
By: Hugh Shepherd
May 20, 2021

In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, discusses advanced forms of disk imaging using Evimetry. As mentioned in the course lecture, advanced forms of disk imaging are extremely beneficial in cases where the forensic process will not require a full disk image. Also, it is useful in situations where only certain file types will be ...

Detecting The Infamous LokiBot Malware Virus
By: Owen Dubiel
May 19, 2021

LokiBot is a nasty little malware virus that continues to advance as it ages. Lokibot is known for being an advanced credential and crypto-wallet stealer. This malware virus has been observed in several different industries and continues to refine and change its techniques. It was first seen in 2015 and has had over 12 confirmed mainstream appearances since then. Disgusting ...