Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
  • Vehicle Tire Pressure Sensors Enable Silent Tracking
  • Qualcomm Zero-Day Exploited in Targeted Android Attacks
  • Speakeasies to Shadow AI: Banning AI Browsers Will Fail
  • AI Agent Overload: How to Solve the Workload Identity Crisis
Skip The Hacker News

The Hacker News

  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
  • Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
  • Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
  • SloppyLemming Espionage Campaign Targets Pakistan, Bangladesh with BurrowShell Backdoor and Rust RAT
  • New Starkiller Phishing Framework Uses Real Login Pages to Bypass MFA Security
  • Malvertising Actor ‘D-Shortiez’ Exploits WebKit Back-Button Hijack in Forced-Redirect Campaign
  • Shannon: Autonomous AI Tool with Nmap Integration Can Uncover and Exploit Security Flaws
Skip Krebs on Security

Krebs on Security

  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters
Skip The Cyber Post

The Cyber Post

  • Our systems have det...
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
  • EP 171: Melody Fraud
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

CyberWorldTrain

  1. Courses
  2. CyberWorldTrain
Expand all

Management Induction of Maritime Cyber Security

Cyber Warfare and Maritime Risks

Global Cyber Capabilities and Trends

Maritime Cybersecurity Law and Policy

Managing Maritime Cybersecurity Operations

Cyber Practitioner in Maritime Cybersecurity Simulation Lab

Risk Analysis and Compliance in Maritime Cybersecurity

Information Assurance

TOMIS#CYBERRANGE#01
CyberWorldTrain
TOMIS#CYBERRANGE#01
Gabriel Raicu

Gabriel Raicu

TTX Coordinator

TOMIS#TTX#01
CyberWorldTrain
TOMIS#TTX#01
Nicu Iancu

Nicu Iancu

TTX Coordinator

Gabriel Raicu

Gabriel Raicu

TTX Coordinator

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me