0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Information Sharing in Cybersecurity
By: Adnan Khan
September 9, 2020

Cybersecurity offers the protection of data and information systems from outside sources. For us to efficiently combat evolving cyber threats, information sharing is unquestionably a valuable resource. When malicious attackers scoop out innovative methods to exploit vulnerabilities, many organizations are facing becoming victims of the same exploits multiple times. Albeit new cyber threat detection technologies are continually emerging and Darknet ...

How To Safely Access The Dark Web
By: Apurv Singh Gautam
September 9, 2020

There’s a lot of speculation and mystery around the dark web. Often, when the dark web is mentioned, people presume it is mainly about criminal activities and that what goes on, on the dark web, is shady (pun intended). Although there’s some truth to it, the dark web has many excellent and useful things also. To access these useful resources, ...

Assembly Course Spotlight
By: Andreea Alexandra Bancu
September 8, 2020

What is Assembly? Assembly language, often abbreviated asm, is a low-level programming language designed for a specific processor. An assembly language may be produced by compiling source code from a high-level programming language (such as C/C++), or it can be written from scratch. Assembly code is converted to machine code using an assembler 1 . This program translates combinations ...

Introduction to DOS and DDOS
By: Sudipta Banerjee
September 8, 2020

What are Cyber Threats? The definition of “Cyber” has seen multiple transitions from the late ’90s to the current era. It was referred to as the science of understanding machines and animals' movement in 1950, or, more commonly, “Cybernetics.” The new definition of “Cyberspace” evolved in 1990, when people believed in the existence of a physical space beyond the electronic ...

State Sponsored Surveillance - The New Norm?
By: Pandu Vardhan
September 4, 2020

Technology and surveillance With the increased use of smartphones and growing technologies like Artificial Intelligence (AI), the public has become an easy target for mass surveillance. Also, the smartphone industry is increasingly less focused on user privacy and security. As smartphones are always active, they are susceptible to various tracking forms, like cellular signals, GPS, Bluetooth, and Wifi. In today's ...

Get Started with Web Application Penetration Testing
By: Gildásio Júnior
September 4, 2020

This blog post covers some important topics about being a web penetration tester, such as: Fundamental concepts Methodology Common web vulnerabilities Helpful study materials As it’s not a comprehensive article, it doesn’t dive too deep into an individual topic. Hopefully, you’ll find some useful nuggets that will help you on your path to specialization. Fundamental Concepts A good penetration tester understands the ...

Intermediate Endpoint Security Course Summary
By: Staford Titus S
September 3, 2020

Establishing impenetrable security is by no means an easy task. Hence, several avenues for erroneous decisions are possible. According to HelpNetSecurity, about 68% of organizations were victims of endpoints attacks in 2019. This brings to light the failure to realize the potential vulnerabilities caused by overlooked entities such as endpoints. Milan Cetic, the course instructor, hopes to educate the importance ...

Focusing Skill Development Priorities Based on Current Cybersecurity Trends
By: Jenna Crawford
September 3, 2020

Organizations today are faced with a threat landscape that continues to evolve, including cyber-attacks that have become much more sophisticated. Cybercriminals are highly motivated and tend to use a wide range of tactics, tools, and techniques to achieve their goals. IBM Security (2020) found that the average time it took for organizations to identify a data breach attack was 207 ...

Course Spotlight: Cloud Governance Principles
By: Matt Duda
September 2, 2020

As a Cybrary user, I bet you'd agree that the cloud is the most disruptive technology many current IT professionals will encounter over the course of their entire careers. The benefits of embracing the cloud are many, and to compete successfully in today’s marketplace being 'in the cloud' must be a part of an organization’s approach to IT. But, as ...

Cybrary's Free Courses | September 2020
By: Tatianna Harris
September 1, 2020

We're here to support you in your mission to learn and grow! The month's free courses are centered around forming a solid foundation. Here is what's available to you to learn for free in 2020. We’ve made 7 courses (that are normally paid!) completely FREE for the entire month of September. Now, your free membership for a __*limited time ...