Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Iran MOIS Colludes With Criminals to Boost Cyberattacks
  • Commercial Spyware Opponents Fear US Policy Shifting
  • Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
  • Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
  • INC Ransomware Group Holds Healthcare Hostage in Oceania
Skip The Hacker News

The Hacker News

  • Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
  • Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
  • Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
  • Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
  • How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Full Root Takeover
  • Six Packagist Packages Linked to Trojanized jQuery Campaign
  • New Critical MediaTek Vulnerability Exposes Android Phone PINs to Theft in 45 seconds
  • Iran-Linked Handala Ramps Up Wiper Attacks on Israeli, Western Targets
  • OpenSSH GSSAPI Flaw Can Be Exploited to Crash SSH Child Processes
Skip Krebs on Security

Krebs on Security

  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts
  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Skip The Cyber Post

The Cyber Post

  • ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
  • Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
  • CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

VR CyberEDU Maritime Center

    Expand all

    Master Courses - Cyber Security

    CyberWorldTrain

    BlackSea Cyber Security Center of Excellence

    Research

    Contact us

    Follow us

    Contact site support
    You are not logged in. (Log in)
    Data retention summary
    Get the mobile app
    Get the mobile app
    Play Store App Store
    Powered by Moodle

    This theme was developed by

    Conecti.me