0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Bluetooth - Another Backdoor for Hackers to Break into our Privacy
By: Phil Abraham
September 10, 2019

Do you know how old Bluetooth connectivity is?Almost 2 decades; do you think this 20-year old wireless capability become old school?No, not at all! Enroll in FREE Crackle Course >> A big thanks to the growth of IoT that positioned Bluetooth into new environments – beyond consumer-facing applications- such as smart buildings, ...

Building a Risk-Based Cybersecurity Architecture
By: SLWelty
August 28, 2019

Blog authored by Christopher J. Hodson I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus far, providing students across the globe with a few insights from my time in the field working as a CISO, architect, designer, and systems engineer. Many of you have asked me about my book, Cyber ...

Best Way to Learn Splunk
By: SLWelty
August 17, 2019

A Breakdown of Learning Splunk First things first, let's understand what Splunk is. There are a variety of courses out there to learn Splunk; however, it's important to understand what it is before jumping in headfirst. Splunk is a one-stop-shop that allows users to search and analyze real-time data, as well as build reports and other visualizations from machine-generated ...

Ways to be Anonymous Online
By: Uladzislau Murashka
August 9, 2019

Discussion of anonymity should not begin with the words proxy, Tor, or VPN, but with the task definition itself. Anonymously connecting to someone else’s server is one thing, anonymously raising your website is another, working anonymously on the internet is another and so on. And all these tasks are solved in different ways. This article is about the job ...

Lookout Black Hat, here comes Cybrary!
August 6, 2019

As I sat in the airport this week thinking about the week ahead, I couldn't help but get a flutter of excitement. The Cybrary team has spent weeks and weeks preparing for what will be our biggest event to date. After 4.5 years, Cybrary (which when I joined was a team of 3) has now eclipsed 60 employees and ...

DNS Under Attack
By: cybergary
July 30, 2019

This post originally appeared on the Cisco Security Blog by author Ben Nahorney. Reposted with permission.  You’ve probably heard the stories by now: one of the fundamental technologies that keeps the internet working has recently become a regular target for attackers. Earlier this month, the UK’s National Cyber Security Centre released an advisory ...

The Evolution of Wi-Fi Encryption and Cracking
By: SLWelty
July 26, 2019

Since 1997, wireless encryption has been a widespread part of wireless access points. These encryption methods allow users to secure their networks with passwords and randomly generated keys. This section explores the history of Wi-Fi encryption, the development of Wi-Fi cracking methods, and how an organization can secure their access points from cracking methods. Wireless networks have quickly become ...

Botnet Structures and Attacks
By: lpark
July 24, 2019

Botnets are a powerful tool for hackers and cybersecurity professionals. Composed of many connected and “infected” devices, botnets are used to carry out user actions on a grand scale. This article explores popular examples of botnets, their structures, and the types of attacks that utilize botnets. Botnets are a popular, alluring option for hackers and cybersecurity professionals across ...

VoIPhreaking: Phone Phreaking for the 21st Century
By: lpark
July 22, 2019

Voice over IP, or VoIP, is an internet technology that relies on online infrastructure to make phone calls. Techniques developed during the frontier days of hacking, phone phreaking, are becoming relevant through VoIP networks. Mobile devices, smart homes, and voice-activated virtual assistants provide many new angles for hackers. This section explores the history of phone phreaking, its evolution ...

Understanding and Preventing Advanced Persistent Threats (APTs)
By: Tatianna
July 21, 2019

Advanced Persistent Threats (APT) are a new type of threat that developed out of standard hacking techniques. APTs are composed of multiple attacks, infiltration, and malware installations through one or many organizations. They are often large in scope and contain many moving parts. This section explores the structure of APTs, famous examples, and methods for preventing APTs ...