0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Business E-mail Compromise (BEC)
By: Nihad Hassan
June 14, 2021

The digital revolution has brought many benefits to our society. One of the early innovative technologies was e-mail, which has become an imperative method of business communication. E-mail is fast, cost-effective, accessible, and convenient. By using e-mail, businesses can efficiently and reliably transfer electronic data (MS Office documents, photos, and data sheets). Despite the great benefits of e-mail, it is still ...

NotPetya: Its Consequences
By: Gabriel Schram
June 14, 2021

NotPetya is widely known as one of the most devastating variants of malware in history. The impact of it was felt particularly in Ukraine, but its area of effect was global. The success of this cyber attack was significantly due to the release of a 0-day exploit called EternalBlue. In this case, it was a 0-day vulnerability in Windows systems. ...

Cybersecurity Skills Gap Analysis
By: Darcy Kempa
June 11, 2021

A skills gap analysis is one tool that can be used to improve an organization’s cybersecurity position. It is a measurement between a current level of performance and a desired level of performance. While the analysis will focus on employee skills, it can uncover problems with a company’s policies, hiring practices, or training programs. This analysis can be time-consuming, but ...

Most Valuable AWS Cybersecurity Certifications
By: Shimon Brathwaite
June 11, 2021

Amazon Web Services (AWS) is one of the biggest cloud provider platforms on the market. The company itself has been growing at a very impressive pace, which will likely continue well into the future. Therefore, if you're trying to be strategic about your career, having a good understanding of AWS will be very helpful if you want to get into ...

What is Data Leakage?
By: Nihad Hassan
June 10, 2021

The digital revolution has impacted all our life aspects; the proliferation of computers and internet technologies is now evident in organizations of all types and across all industries. The most apparent evidence of digitalization was the massive increase in digital data. For instance, nowadays, most data are created digitally and never find their way into papers. According to Seagate, by ...

K-12 Cybersecurity
By: Page Glave
June 10, 2021

Fifth grade (K-12) school districts are experiencing increasing cyber-attacks, especially in light of increased virtual learning due to the COVID-19 pandemic. From distributed denial of service attacks to ransomware, school districts are under a wide variety of attacks. Since 2016, districts in the United States have experienced more than 1,000 attacks. Cybercriminals are finding many school districts to be attractive ...

Who is Human Error: The story behind a security awareness training celebrity
By: Shelby Welty
June 10, 2021

Self-described C-Level cybersecurity celebrity and comedian Drew Freed, joined Digital Media Producer, Thomas Horlacher, on the Cybrary Podcast to discuss Drew’s role as Human Error in the security awareness training by Mimecast. This unique character that has a proclivity for giving out passive security advice in the workplace went viral within the cybersecurity community in recent years. Follow the origins ...

How to detect PowerShell ShellCode Within Splunk Search
By: Owen Dubiel
June 9, 2021

Being able to respond and detect malicious events effectively is critical when operating SIEM solutions. There is a fine line between seeing too much and not seeing enough. This article will focus on how to identify and detect PowerShell ShellCode with a Splunk search query. That search can be made into a dashboard or even developed into an alert whenever ...

Third Party Risk Management
By: Nihad Hassan
June 9, 2021

We live in a world where products and services are now manufactured by more than one provider located in different countries. However, the proliferation of the internet and IT technology shifted the outsourcing concept to a new dimension. Outsourcing is the practice of shifting part of the workload, tasks, work operations, or processes to an external vendor for a specific ...

Cybrary Poised For Growth with Hanes at the Helm
By: Kevin Hanes
June 9, 2021

The cybersecurity skills gap is a continuous and difficult challenge – and one (among many things) that the industry is working hard to resolve. Knowing first-hand what it's like to be in the cybersecurity fight every day while struggling to find the people and skills you need to get the job done is what makes me so passionate about this ...