0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Understanding and Preventing Advanced Persistent Threats (APTs)
By: Tatianna
July 21, 2019

Advanced Persistent Threats (APT) are a new type of threat that developed out of standard hacking techniques. APTs are composed of multiple attacks, infiltration, and malware installations through one or many organizations. They are often large in scope and contain many moving parts. This section explores the structure of APTs, famous examples, and methods for preventing APTs ...

Most Frequently Used Mobile Hacking Techniques
By: lpark
July 19, 2019

Mobile hacking is a versatile field that is on the rise, but how do malicious hackers and cybersecurity professionals approach the subject? This section explores the main techniques for the exfiltration of personally identifying information from mobile devices. The latest methods are explained along with methods of detection and prevention. As we’ve discovered in previous sections, mobile ...

The Development of Infrastructure Attacks
By: lpark
July 17, 2019

Hacking and cybersecurity incidents can take on a character of great variation. Anything from a simple prank to a widespread shutdown of essential services is considered “hacking”. The field of cybersecurity can cover a very broad spectrum of activities. Essential services such as water, electricity, waste management, and climate control rely on computers and other digital devices that are ...

Symlink Attacks
By: lpark
July 16, 2019

Every year, new techniques and exploits are developed to compromise websites. Often times, these exploits are used in vulnerability assessments to improve the security of websites and web hosting services. Because of this, major hacks and exploits can be quickly patched and secured against. Hackers and cybersecurity professionals are constantly looking for new exploits, and symlink hacking is one ...

How to ensure employee engagement in security awareness training
By: purvikshah
July 15, 2019

Originally posted on the AwareGO blog. Reprinted with permission. Training | May 9, 2019 | Ragnar Sigurðsson For over 30 years companies have been connected to networks and the internet. And for almost all of that time they have been dealing with cyber security threats. From all this experience one thing has become absolutely certain … The best way to ...

Mobile Deauthentication Attacks
By: angelawood
July 13, 2019

TL;DR: Deauthentication attacks have been around for a long time, and new techniques for altering wireless network connections have developed around new technologies. Mobile apps with working de-authentication protocols are easily accessible on the marketplace, and more devices and systems rely on internet connections to function. This section explores de-authentication attacks, their context in new ...

Pricing a Vulnerability Assessment
By: thorlacher2322
July 11, 2019

Penetration testing and vulnerability assessment are an essential step in securing an organization’s communications networks. In some cases, such as hospitals and other public facilities, vulnerability assessments are required by law. How much can one expect to pay or bill for a vulnerability assessment? This depends on several factors, but there are ways to estimate the ...

Notorious Hacking Groups of the 21st Century
By: lpark
July 9, 2019

TL;DR: Coordinated hacking groups carry out some of the most visible attacks in the cybersecurity industry. No matter their motivations, hacking groups can gain notoriety and exposure from their works. This section looks at some of the most notorious hacking groups in recent years, what they did, and why they did it. The cultural component ...

Get to Know Your Instructor: Kitt Parker
By: lpark
July 9, 2019

onethird] [/onethird Fun Facts About Kitt! What course do you teach? Introduction to SQL What is an interesting fact about you? I enjoy building personal computers and servers with hardware pieces. I then overclock them to push their limits. ...

Current Threats in Ransomware
By: Mike G.
July 7, 2019

Ransomware “Growth” Ransomware attacks have gained prominence in recent times, and industries and governments across the world have implemented policies and advisories to counter the threat. The attack involves a malicious program that holds user or organizational data for “ransom” in exchange for payment. The payment is often made anonymously through digital currencies. In order to ...