0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



What is it? Capture the Flag is originally derived from gaming: arena type games where two players would pit against one another and capture the enemy's flag while defending their own. This game mode then got ported into the world of cybersecurity to develop and showcase one's skills. It's alright if you aren't a gamer. The only thing it shares ...


Given the rising tide of data breaches, the value of cybersecurity must be absolutely clear to everyone in the board room. But communicating this value, as well as the risks the company faces, is often challenging. Most business leaders would agree that cybersecurity is a top priority, but then they also have many other top priorities, such as dealing with ...


Some people consider hacking to be all about the use of technical capabilities or software. Well, they are wrong - in part. Everyone can learn how to use individuals to get confidential information, which would help them in their tasks, called Social Engineering—wondering how this is useful? Most of them would have read this famous saying over the internet, stating, ...


This blog was originally posted on cisco.com but has been reposted with permission by author. October is Cybersecurity Awareness Month and the first thought that comes to mind for me is the famous quote by Mike Tyson: “Everybody has a plan until they get punched in the mouth.” The world has experienced tremendous changes over the course of a few short ...


BYOD, or Bring Your Own Device, is a program by which employees can use their own devices for work purposes. End-user devices can be anything ranging from their laptops to their cell phones. BYOD is meant to allow more flexibility within an organization. Not only does it allow employees to work on equipment that is owned by them and, in ...


The holiday season is upon us, and we're making 7 of our premium courses, FREE. This month's free courses are centered around Cybersecurity Awareness. Here is what's available to you to learn for free in October. We’ve made 7 courses (that are normally paid!) completely FREE for the entire month of October. Now, your free membership for includes some ...


Knowledge is Power: The ARP-Scan Advantage Hackers are hiding in plain sight. As noted by HelpNetSecurity, hidden applications were responsible for almost half of all malicious activity last year, and attackers continue to develop new ways for these apps to avoid detection on corporate networks. There's an even bigger problem on the horizon: Devices. Most users now own multiple devices, including ...


Top 12 Computer Forensics Tools Each year, millions of people enter the internet era by using different computing devices like laptops, tablets, and smartphones in today's digital age. The rapid expansion of digital society results in shifting a great number of crimes from the traditional routes to the digital crime discipline. Computer forensics (also known as digital forensics) is a branch ...


Nowadays, cyber threats are coming from everywhere, from both the surface and the dark web. For instance, many enterprises rely on information collected from dark web communities to predict future attacks against their IT infrastructure and information systems. The World Wide Web is composed of three layers: the surface, deep, and dark webs. The surface–or normal - web is ...


It is high time for all to start learning cybersecurity. The number of nefarious actors is on the rise in cyberspace. The regulations on information security are still not mature. Cybersecurity defends good actors from malicious attacks and unnoticed crimes perpetrated by threat actors. The impact of these crimes is manifold and may not necessarily manifest as theft, pilferage, financial loss, ...