Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • An Audit Isn't a Speed Bump — It's Your Cloud Co-Pilot
  • Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
  • CISA, FBI, NSA Warn of Chinese 'Global Espionage System'
  • Hackers Steal 4M+ TransUnion Customers' Data
  • Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups
Skip The Hacker News

The Hacker News

  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices
  • Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution
  • Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach
  • Amazon Takes Down Russian APT29 Infrastructure Targeting Users
  • Citrix 0-Day Flaw Under Active Exploitation Since May
  • QNAP Flaw Allows Attackers to Bypass Authentication
  • WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices
Skip Krebs on Security

Krebs on Security

  • Affiliates Flock to ‘Soulless’ Scam Gambling Machine
  • DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
  • SIM-Swapper, Scattered Spider Hacker Gets 10 Years
  • Oregon Man Charged in ‘Rapper Bot’ DDoS Service
  • Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme
Skip The Cyber Post

The Cyber Post

  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
  • ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

VR CyberEDU Maritime Center

    Expand all

    Master Courses - Cyber Security

    CyberWorldTrain

    BlackSea Cyber Security Center of Excellence

    Research

    Contact us

    Follow us

    Contact site support
    You are not logged in. (Log in)
    Data retention summary
    Get the mobile app
    Get the mobile app
    Play Store App Store
    Powered by Moodle

    This theme was developed by

    Conecti.me