0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Do you know how old Bluetooth connectivity is?Almost 2 decades; do you think this 20-year old wireless capability become old school?No, not at all! Enroll in FREE Crackle Course >> A big thanks to the growth of IoT that positioned Bluetooth into new environments – beyond consumer-facing applications- such as smart buildings, ...


Blog authored by Christopher J. Hodson I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus far, providing students across the globe with a few insights from my time in the field working as a CISO, architect, designer, and systems engineer. Many of you have asked me about my book, Cyber ...


A Breakdown of Learning Splunk First things first, let's understand what Splunk is. There are a variety of courses out there to learn Splunk; however, it's important to understand what it is before jumping in headfirst. Splunk is a one-stop-shop that allows users to search and analyze real-time data, as well as build reports and other visualizations from machine-generated ...


Discussion of anonymity should not begin with the words proxy, Tor, or VPN, but with the task definition itself. Anonymously connecting to someone else’s server is one thing, anonymously raising your website is another, working anonymously on the internet is another and so on. And all these tasks are solved in different ways. This article is about the job ...


As I sat in the airport this week thinking about the week ahead, I couldn't help but get a flutter of excitement. The Cybrary team has spent weeks and weeks preparing for what will be our biggest event to date. After 4.5 years, Cybrary (which when I joined was a team of 3) has now eclipsed 60 employees and ...


This post originally appeared on the Cisco Security Blog by author Ben Nahorney. Reposted with permission. You’ve probably heard the stories by now: one of the fundamental technologies that keeps the internet working has recently become a regular target for attackers. Earlier this month, the UK’s National Cyber Security Centre released an advisory ...


Since 1997, wireless encryption has been a widespread part of wireless access points. These encryption methods allow users to secure their networks with passwords and randomly generated keys. This section explores the history of Wi-Fi encryption, the development of Wi-Fi cracking methods, and how an organization can secure their access points from cracking methods. Wireless networks have quickly become ...


Botnets are a powerful tool for hackers and cybersecurity professionals. Composed of many connected and “infected” devices, botnets are used to carry out user actions on a grand scale. This article explores popular examples of botnets, their structures, and the types of attacks that utilize botnets. Botnets are a popular, alluring option for hackers and cybersecurity professionals across ...


Voice over IP, or VoIP, is an internet technology that relies on online infrastructure to make phone calls. Techniques developed during the frontier days of hacking, phone phreaking, are becoming relevant through VoIP networks. Mobile devices, smart homes, and voice-activated virtual assistants provide many new angles for hackers. This section explores the history of phone phreaking, its evolution ...


Advanced Persistent Threats (APT) are a new type of threat that developed out of standard hacking techniques. APTs are composed of multiple attacks, infiltration, and malware installations through one or many organizations. They are often large in scope and contain many moving parts. This section explores the structure of APTs, famous examples, and methods for preventing APTs ...