0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Security Operation Centers (SOCs) is the central unit that handles all security issues on an organization level. SOCs receive alerts from all the SIEMs and other security monitoring tools that an organization has in place and analyzes those alerts to determine what is going on within the company network. It is a great place to begin your cybersecurity career because ...


Building a robust cybersecurity program often feels like an impossible task. This feeling can be caused by complex enterprise environments, company politics, vendor scaremongering, and jargon-packed marketing material that promises to provide you the silver bullet for the next-gen fileless malware. It doesn't have to be this way. If we boil cybersecurity breaches down and peel away the marketing, we find ...


As the world moves steadily to become fully digital, organizations of all sizes and across all industries utilize digital solutions to facilitate work operations and communicate with customers. The rapid pace at which the IT industry advances raises many challenges for organizations, especially when developing IT solutions to enhance digital transformation efforts. DevOps is a set of philosophies, tools, and practices ...


One of the best security measures for any organization is to improve employee security awareness. This is because an organization can enhance its cybersecurity team's efforts by educating and engaging all employees. This way, the employees can help reduce risky behavior, report suspicious emails or activities, and improve an organization's cybersecurity posture at little to no, additional cost. Develop Interactive ...


Supply chain attacks are not new to the industry. They have been used in several high-profile breaches across. Supply chain attacks target less secure parts of an organization's supply chain to breach them. A Brief History of Supply Chain attacks The SolarWinds breach led to the compromise of various government and cybersecurity agencies due to a sophisticated supply chain attack. It ...


Software development is an exciting and in-demand career in the IT industry. Many developer roles are available for qualified professionals, and opportunities continue to grow as technology advances. Students will learn to develop, create, maintain, and write or code new (or modify existing) software, applications, or specialized utility programs on this career path. With Cybrary's subject matter expert instructors, virtual ...


Public cloud usage is accelerating, and as businesses move their infrastructure and services to the cloud, many take advantage of a hybrid or multi-cloud approach. When companies utilize a hybrid or multi-cloud strategy, they decide to use different cloud services from various providers, such as Amazon Web Service (AWS), Microsoft Azure, or Google Cloud Platform (GCP), to name a few. ...


As the world rushes to adopt digital transformation in all aspects of life, organizations of all sizes and across all sectors are now leveraging digital solutions to run their operations and increase productivity. Since the start of the COVID-19 pandemic, the world has witnessed a massive shift in adopting the remote work model. Organizations have implemented this model to remain ...


In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, discusses advanced forms of disk imaging using Evimetry. As mentioned in the course lecture, advanced forms of disk imaging are extremely beneficial in cases where the forensic process will not require a full disk image. Also, it is useful in situations where only certain file types will be ...


LokiBot is a nasty little malware virus that continues to advance as it ages. Lokibot is known for being an advanced credential and crypto-wallet stealer. This malware virus has been observed in several different industries and continues to refine and change its techniques. It was first seen in 2015 and has had over 12 confirmed mainstream appearances since then. Disgusting ...