Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
  • Microsoft Fixes Exploited Zero Day in Light Patch Tuesday
  • Packer-as-a-Service Shanya Hides Ransomware, Kills EDR
  • Analysts Warn of Cybersecurity Risks in Humanoid Robots
  • Gemini Enterprise No-Click Flaw Exposes Sensitive Data
Skip The Hacker News

The Hacker News

  • North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware
  • Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
  • Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
  • How to Streamline Zero Trust Using the Shared Signals Framework
  • Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Akira Group Targets Hyper-V and VMware ESXi with Ransomware Exploiting Vulnerabilities
  • New Vishing Attack Exploits Microsoft Teams and QuickAssist to Deploy .NET Malware
  • Malicious VS Code on Microsoft Registry Steals WiFi Passwords and Captures Screens
  • SAP Security Patch Day Fixes Critical Flaws in Solution Manager, NetWeaver & More
  • AI-Driven Tools Uncover GhostPenguin Backdoor Attacking Linux Servers
Skip Krebs on Security

Krebs on Security

  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
  • Is Your Android TV Streaming Box Part of a Botnet?
  • Mozilla Says It’s Finally Done With Two-Faced Onerep
Skip The Cyber Post

The Cyber Post

  • Gainsight Expands Impacted Customer List Following Salesforce Security Alert
  • ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist
  • ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
  • Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

CyberWorldTrain

  1. Courses
  2. CyberWorldTrain
Expand all

Management Induction of Maritime Cyber Security

Cyber Warfare and Maritime Risks

Global Cyber Capabilities and Trends

Maritime Cybersecurity Law and Policy

Managing Maritime Cybersecurity Operations

Cyber Practitioner in Maritime Cybersecurity Simulation Lab

Risk Analysis and Compliance in Maritime Cybersecurity

Information Assurance

TOMIS#CYBERRANGE#01
CyberWorldTrain
TOMIS#CYBERRANGE#01
Gabriel Raicu

Gabriel Raicu

TTX Coordinator

TOMIS#TTX#01
CyberWorldTrain
TOMIS#TTX#01
Nicu Iancu

Nicu Iancu

TTX Coordinator

Gabriel Raicu

Gabriel Raicu

TTX Coordinator

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me