0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Gain Intel Using OSINT Tools
By: Marylin de Kort
June 4, 2020

Cybercriminals are becoming more versatile with their attacks by carefully selecting information about their target that could be useful in a fake email (phishing email). Many cybercriminals are using a technique called Open Source Intelligence (OSINT) to gather as much valuable information about their target(s) as possible. Most of the time, valuable information is found by just using a search ...

Who Can Learn IoT?
By: Michael Cunningham
June 4, 2020

Just who can learn IoT? Wow, that, to me, is a loaded question. My first idea is anyone. But, that doesn't fit this blog. I am not trying to add some humor to the blog. I remember my community college days. My college had a program that allowed high school students to take courses for credit. We had one 16-year-old young ...

Information Security: Authorized Access Needs Amid COVID-19 Outbreak
By: Emily Daniel
June 3, 2020

COVID-19 Cybersecurity Impacts Due to greatly increased activity in digital transactions, fraudsters have found opportunities to exploit vulnerabilities in the systems and target naive online users through facets of digital fraud. The rate of account takeover (ATO) fraud from 2018 to 2019 crossed 347 percent, with shipping fraud being 391 percent in a digital environment. However, during coronavirus, where the ...

Intro To Vagrant Software
By: Pierluigi Riti
June 3, 2020

Virtualization has become very important for every developer because virtualization makes it possible to create a complex virtual environment in one's computer. Vagrant, by Hashicorp, is a free software used to create these virtual environments. Configuring environments by learning Vagrant is quite easy. Vagrant provides a configuration language called HCL (Hashicorp Configuration Language), which is used for defining the virtual environment ...

Has Machine Learning (ML) and Artificial Intelligence (AI) Yielded Benefits To The Security Operations Center(SOC)?
By: Pankaj Kamboj
June 2, 2020

This topic has become a buzzword with the advancement of technology and glittering marketing by vendors around Machine Learning (ML) and Artificial Intelligence (AI). How it is benefiting the customer in real sense is a question that needs to be addressed from a quantitative and qualitative risk analysis perspective, which is a very subjective topic and requires a detailed analysis. ...

Threat Modeling, The First Step Toward Security In Software Development Life Cycle (SDLC)
By: Krutik Poojara
June 2, 2020

Threat modeling is the security process by which we can identify, categorize, and analyze threats. Generally, threat modeling is done at an early stage in the software development lifecycle. Still, it can be performed at any stage whenever there is some change in the architecture or design. The purpose of threat modeling is to come up with the solution for ...

Remote Work And The Threat Landscape
By: Ben Nahorney
June 1, 2020

This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Last month, after the dust had settled from the move from office to remote work, we took a look at ways you could improve your security posture. In it, we discussed how you can shore up older and personal devices now being used for work ...

Why Learn Cybersecurity
By: Karim Bakhsh Amiry
June 1, 2020

Almost everyone around the globe uses the interconnected network, called the internet. Everybody plays a part here; for instance, many of the people have social media accounts. Some only use email services; still, others use online education and similar technologies. People share their most personal files over the internet, or send them to specific people, but is consideration given to ...

Can I Learn AI Without Coding?
By: Jitendra Singh
May 29, 2020

People have always wanted intelligent machines. This desire dates back to ancient Cultures. Various epics and mythological stories mention the presence of their own cosmic weapons, robots, and flying chariots. Engineers and artisans in India, China, Alexandria, Arabia, and the Greek World started making self-moving devices, flying bird models, animated machines, and automatons at around 3rd Century BC. This long-time ...

The Crucial Utterance On Top Of Darkweb’s Anonymization, Privacy, and Security Using Tor
By: Revanth S
May 29, 2020

The Internet is the world's most vigorous and broadest strength; it has become a way of life that people rely on. The Internet has become a sophisticated part of the day-to-day life of many people. It promotes interactive communication between two individuals over a transcending space. The Internet assists the function of the World's leading establishments like research centers, hospitals, ...