Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Ransomware Gang Goes Full 'Godfather' With Cartel
  • CISA Makes Unpublicized Ransomware Updates to KEV Catalog
  • Attackers Use Windows Screensavers to Drop Malware, RMM Tools
  • Extra Extra! Announcing DR Global Latin America
  • Big Breach or Smooth Sailing? Mexican Gov't Faces Leak Allegations
Skip The Hacker News

The Hacker News

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • MomentProof Deploys Patented Digital Asset Protection
  • TP-Link Vulnerabilities Let Hackers Take Full Control of Devices
  • New AI-Powered Threat Allows Hackers to Gain AWS Admin Access in Minutes
  • PhantomVAI Custom Loader Abuses RunPE Utility to Launch Stealthy Attacks on Users
  • Critical ASUSTOR NAS Security Flaw Enables Complete Device Takeover
Skip Krebs on Security

Krebs on Security

  • Please Don’t Feed the Scattered Lapsus ShinyHunters
  • Who Operates the Badbox 2.0 Botnet?
  • Kimwolf Botnet Lurking in Corporate, Govt. Networks
  • Patch Tuesday, January 2026 Edition
  • Who Benefited from the Aisuru and Kimwolf Botnets?
Skip The Cyber Post

The Cyber Post

  • EP 170: Phrack
  • Badges, Bytes and Blackmail
  • ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
  • Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
  • Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Master Courses - Cyber Security

  1. Courses
  2. Master Courses - Cyber Security
Expand all

RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR

EN - CYBER SECURITY AND RISK MANGEMENT

IntelThreat
Master Courses - Cyber Security
IntelThreat

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me