Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Australia Begins New Ransomware Payment Disclosure Rules
  • Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform
  • In the AI Race With China, Don't Forget About Security
  • 'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia
  • FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams
Skip The Hacker News

The Hacker News

  • Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub
  • Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN
  • Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU
  • ⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More
  • The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands
  • IBM DataStage Bug Exposes Database Credentials in Plain Tex
  • Critical MediaTek Flaws Allow Hackers to Gain Elevated Access with No User Input
  • Realtek Bluetooth Driver Flaw Allows Attackers to Delete Any File on Windows Systems
  • HuluCaptcha: Fake Captcha Kit Tricks Users into Executing Code via Windows Run Command
Skip Krebs on Security

Krebs on Security

  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Pakistan Arrests 21 in ‘Heartsender’ Malware Service
  • Oops: DanaBot Malware Devs Infected Their Own PCs
  • KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
  • Breachforums Boss to Pay $700k in Healthcare Breach
Skip The Cyber Post

The Cyber Post

  • China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
  • DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
  • Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
  • From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign
  • Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

Anul II - semestrul II

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul II - semestrul II
Practică IV
Anul II - semestrul II
Practică IV
Calculul evolutiv în tehnologia informaţiei
Anul II - semestrul II
Calculul evolutiv în tehnologia informaţiei
Tehnici și instrumente de evaluare a securității cibernetice, hacking etic şi audit de securitate
Anul II - semestrul II
Tehnici și instrumente de evaluare a securității cibernetice, hacking etic şi audit de securitate
Mecanisme de răspuns la crize din perspectiva Cyber Security
Anul II - semestrul II
Mecanisme de răspuns la crize din perspectiva Cyber Security
Investigarea infracţiunilor informatice
Anul II - semestrul II
Investigarea infracţiunilor informatice

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me