Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • An Audit Isn't a Speed Bump — It's Your Cloud Co-Pilot
  • Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
  • CISA, FBI, NSA Warn of Chinese 'Global Espionage System'
  • Hackers Steal 4M+ TransUnion Customers' Data
  • Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups
Skip The Hacker News

The Hacker News

  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • WhatsApp Patches Zero-Click Exploit Targeting iOS and macOS Devices
  • Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution
  • Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics
  • Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely
  • Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server
  • Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach
  • Amazon Takes Down Russian APT29 Infrastructure Targeting Users
Skip Krebs on Security

Krebs on Security

  • Affiliates Flock to ‘Soulless’ Scam Gambling Machine
  • DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
  • SIM-Swapper, Scattered Spider Hacker Gets 10 Years
  • Oregon Man Charged in ‘Rapper Bot’ DDoS Service
  • Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme
Skip The Cyber Post

The Cyber Post

  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
  • ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

CyberWorldTrain

  1. Courses
  2. CyberWorldTrain
Expand all

Management Induction of Maritime Cyber Security

Cyber Warfare and Maritime Risks

Global Cyber Capabilities and Trends

Maritime Cybersecurity Law and Policy

Managing Maritime Cybersecurity Operations

Cyber Practitioner in Maritime Cybersecurity Simulation Lab

Risk Analysis and Compliance in Maritime Cybersecurity

Information Assurance

TOMIS#CYBERRANGE#01
CyberWorldTrain
TOMIS#CYBERRANGE#01
Gabriel Raicu

Gabriel Raicu

TTX Coordinator

TOMIS#TTX#01
CyberWorldTrain
TOMIS#TTX#01
Nicu Iancu

Nicu Iancu

TTX Coordinator

Gabriel Raicu

Gabriel Raicu

TTX Coordinator

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me