0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Importance Of Javascript For Web App Hacking
By: Shimon Brathwaite
July 23, 2021

Javascript has become a popular language in the 21st century. There are roughly 1.6 billion websites globally, and over 95% of them (1.52 billion websites) used Javascript. It is widely used for developing web applications, especially the front-end aspect that focuses on aesthetics and animations. If you are interested in hacking web applications, it is highly advisable to learn Javascript ...

Hacking As A Service
By: Gabriel Schram
July 22, 2021

Skilled cybercriminals take part in dark web markets by offering their skills to those willing to pay; this is considered hacking-as-a-service (HaaS). Not to be confused with penetration testing, HaaS is typically associated with illegal activity hosted by dark market web users. One reason HaaS markets have been able to establish themselves is the advancement of open-source hacking tools. There ...

Data Retention Policy
By: Nihad Hassan
July 22, 2021

The world is moving increasingly into becoming fully digital. People are increasingly utilizing technology in all aspects of their lives, from work to study, socializing, entertainment, online communications, shopping, and online banking, to name a few. Today, most data are created digitally and are never printed on paper. As digital technologies advance, we can expect massive amounts of data to ...

Using Forescout To Solidify Network Boundaries
By: Owen Dubiel
July 21, 2021

Forescout makes Network Access Control (NAC) a breeze with its intuitive rule sets and the ability to create custom enforcement policies as granular as needed. This article will dive into some best features within the Forescout NAC solution that should be enforced to help strengthen an internal network from external threats. Threats may be lurking on employee assets or even ...

Top Kali Linux Tools For Ethical Hacking
By: Shimon Brathwaite
July 21, 2021

Kali Linux is one of the best Linux distributions for ethical hacking. The fact that it is open-source and accessible to users is a big reason. Still, the major draw is that Kali Linux comes pre-installed with all of the hacking tools a professional cybersecurity needs. Kali Linux makes this easy by preparing most of the top software applications in ...

Cyber Forensics
By: Divya Bora
July 20, 2021

WHAT IS CYBER FORENSICS? Cyber Forensics is defined as the process of gathering and documenting proof from a computing device in a form by utilizing investigation and analysis techniques that will be admissible in court. Cyber Forensics is also known as Digital Forensics or Computer Forensics. The term digital forensics was originally used as a synonym for computer forensics but ...

General Cybersecurity Interview Questions
By: Nihad Hassan
July 20, 2021

Cybersecurity is one of the fastest-growing job domains. As the digital transformation moves at a rapid pace, cybercriminals shift their activities to cyberspace. According to Cybersecurity Ventures, the global cost of cybercrime is projected to reach 6 trillion in 2021. The number is expected to reach $10.5 trillion in 2025. The massive increase in cybercrime costs will create a ...

Everything You Need To Know About Microsoft Azure Administrator Exam
By: Prasanna Peshkar
July 19, 2021

There is no debate that the future is in cloud computing. People are adopting more and more cloud services (even if they fail to recognize it), and companies are pushing to digitally modify their services, employing the potential of cloud computing to become more productive, effective, and competitive. Microsoft Azure certification courses are hot topics for both current and prospective IT ...

Slackbot for Rapid Response
By: Owen Dubiel
July 19, 2021

Slack is one of the leading communication platforms in both personal and professional use. Known for its inclusive collaboration style chats, Slack is infused with emojis, gifs, and the ability even to have group calls on the fly; Slack has made itself a staple in the new era of remote work. Many may not know the full capabilities that Slack ...

The Beginner's Guide To Zero Trust
By: Elviraluke Napwora
July 16, 2021

A BRIEF HISTORY; THE JOURNEY TO ZERO TRUST SECURITY In the recent past, security models were envisioned as "inside means trusted" and "outside means untrusted." However, in today's multifaceted and dynamic environment, and with networks consisting of mobile technologies, remote access/VPN use, cloud environment, etc., the perimeter-based approach becomes an inherent drawback in managing security because it grants excessive ...