Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Rapid7 Launches Managed Detection & Response (MDR) for Enterprise
  • After Pahalgam Attack, Hacktivists Unite Under #OpIndia
  • LockBit Ransomware Gang Hacked, Operations Data Leaked
  • Cyber Then & Now: Inside a 2-Decade Industry Evolution
  • Commvault: Vulnerability Patch Works as Intended
Skip The Hacker News

The Hacker News

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Cyberattackers Targeting IT Help Desks for Initial Breach
  • New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources
  • Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks
  • Threat Actors Target Job Seekers with Three New Unique Adversaries
  • Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms
Skip Krebs on Security

Krebs on Security

  • Pakistani Firm Shipped Fentanyl Analogs, Scams to US
  • xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs
  • Alleged ‘Scattered Spider’ Member Extradited to U.S.
  • DOGE Worker’s Code Supports NLRB Whistleblower
  • Whistleblower: DOGE Siphoned NLRB Case Data
Skip The Cyber Post

The Cyber Post

  • Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware
  • Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures
  • Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization
  • Entra ID Data Protection: Essential or Overkill?
  • Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches

Anul I - semestrul II

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul I - semestrul II
Practică II
Anul I - semestrul II
Practică II
Cadrul naţional şi european de reglementare al securităţii cibernetice
Anul I - semestrul II
Cadrul naţional şi european de reglementare al securităţii cibernetice
Infracţiuni informatice în legislaţia penală română
Anul I - semestrul II
Infracţiuni informatice în legislaţia penală română
Siguranța tehnicilor de programare și securitatea aplicațiilor și sistemelor informatice
Anul I - semestrul II
Siguranța tehnicilor de programare și securitatea aplicațiilor și sistemelor informatice
Securitatea cibernetică a dispozitivelor mobile și riscurile asociate IoT
Anul I - semestrul II
Securitatea cibernetică a dispozitivelor mobile și riscurile asociate IoT
Managementul securității organizaționale
Anul I - semestrul II
Managementul securității organizaționale
Sisteme de conducere a proceselor industriale şi protecţie cibernetică (SCADA, PLC, DPC)
Anul I - semestrul II
Sisteme de conducere a proceselor industriale şi protecţie cibernetică (SCADA, PLC, DPC)

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me