Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • China Hackers Test AI-Optimized Attack Chains in Taiwan
  • LevelBlue Announces Plans to Acquire XDR Provider Cybereason
  • 'Mysterious Elephant' Moves Beyond Recycled Malware
  • F5 BIG-IP Environment Breached by Nation-State Actor
  • Harvard University Breached in Oracle Zero-Day Attack
Skip The Hacker News

The Hacker News

  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
  • Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform
  • Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacks
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • North Korean Hackers Deploy BeaverTail–OtterCookie Combo for Keylogging Attacks
  • Phishing Alert: Fake ‘LastPass Hack’ Emails Spreading Malware
  • Operation Silk Lure: Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery
  • CISA Alerts on Actively Exploited Windows Improper Access Control Flaw
  • Qilin Ransomware Leverages Ghost Bulletproof Hosting for Global Attacks
Skip Krebs on Security

Krebs on Security

  • Patch Tuesday, October 2025 ‘End of 10’ Edition
  • DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
  • ShinyHunters Wage Broad Corporate Extortion Spree
  • Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms
  • Self-Replicating Worm Hits 180+ Software Packages
Skip The Cyber Post

The Cyber Post

  • LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
  • CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
  • From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

Anul I - semestrul II

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul I - semestrul II
Practică II
Anul I - semestrul II
Practică II
Cadrul naţional şi european de reglementare al securităţii cibernetice
Anul I - semestrul II
Cadrul naţional şi european de reglementare al securităţii cibernetice
Infracţiuni informatice în legislaţia penală română
Anul I - semestrul II
Infracţiuni informatice în legislaţia penală română
Siguranța tehnicilor de programare și securitatea aplicațiilor și sistemelor informatice
Anul I - semestrul II
Siguranța tehnicilor de programare și securitatea aplicațiilor și sistemelor informatice
Securitatea cibernetică a dispozitivelor mobile și riscurile asociate IoT
Anul I - semestrul II
Securitatea cibernetică a dispozitivelor mobile și riscurile asociate IoT
Managementul securității organizaționale
Anul I - semestrul II
Managementul securității organizaționale
Sisteme de conducere a proceselor industriale şi protecţie cibernetică (SCADA, PLC, DPC)
Anul I - semestrul II
Sisteme de conducere a proceselor industriale şi protecţie cibernetică (SCADA, PLC, DPC)

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me