Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
  • The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
  • Cyberattackers Don't Care About Good Causes
  • Will AI Save Consumers From Smartphone-Based Phishing Attacks?
  • Most Google Cloud Attacks Start With Bug Exploitation
Skip The Hacker News

The Hacker News

  • Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
  • Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
  • INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
  • Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
  • Investigating a New Click-Fix Variant
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • GlassWorm Spreads via 72 Malicious Open VSX Extensions Hidden in Transitive Dependencies
  • Global Authorities Take Down 45,000 Malicious IPs Used in Ransomware Campaigns
  • New Critical AdGuard Home Flaw Lets Attackers Bypass Authentication
  • Authorities Shut Down Proxy Service Linked to Malware Campaign Targeting Thousands of Users
  • AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Skip Krebs on Security

Krebs on Security

  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts
  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Skip The Cyber Post

The Cyber Post

  • Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
  • INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
  • ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
  • Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
  • CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Anul II - semestrul II

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul II - semestrul II
Practică IV
Anul II - semestrul II
Practică IV
Calculul evolutiv în tehnologia informaţiei
Anul II - semestrul II
Calculul evolutiv în tehnologia informaţiei
Tehnici și instrumente de evaluare a securității cibernetice, hacking etic şi audit de securitate
Anul II - semestrul II
Tehnici și instrumente de evaluare a securității cibernetice, hacking etic şi audit de securitate
Mecanisme de răspuns la crize din perspectiva Cyber Security
Anul II - semestrul II
Mecanisme de răspuns la crize din perspectiva Cyber Security
Investigarea infracţiunilor informatice
Anul II - semestrul II
Investigarea infracţiunilor informatice

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me