Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia
  • How Dark Reading Lifted Off the Launchpad in 2006
  • 76% of All Crypto Stolen in 2026 Is Now in North Korea
  • If AI's So Smart, Why Does It Keep Deleting Production Databases?
  • Name That Toon: Mark of (Security) Progress
Skip The Hacker News

The Hacker News

  • Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools
  • Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
  • ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More
  • 2026: The Year of AI-Assisted Attacks
  • Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Bluekit Phishing Kit Streamlines Domains, 2FA Lures, and Session Hijacking
  • Cisco Launches AI Provenance Tool to Strengthen Security and Compliance
  • Canvas Confirms Data Breach Following ShinyHunters Claim
  • Malicious TanStack Package Abuses Postinstall Script to Steal Developer Secrets
  • Botnet Hijacks ADB-Exposed Android Devices to Target Minecraft Servers
Skip Krebs on Security

Krebs on Security

  • Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
  • ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
  • Patch Tuesday, April 2026 Edition
  • Russia Hacked Routers to Steal Microsoft Office Tokens
  • Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
Skip The Cyber Post

The Cyber Post

  • Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
  • ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
  • CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
  • VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
  • PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

Anul II - semestrul II

  1. Courses
  2. Master Courses - Cyber Security
  3. RO - SECURITATE CIBERNETICĂ ŞI MANAGEMENTUL RISCURILOR
  4. Anul II - semestrul II
Practică IV
Anul II - semestrul II
Practică IV
Calculul evolutiv în tehnologia informaţiei
Anul II - semestrul II
Calculul evolutiv în tehnologia informaţiei
Tehnici și instrumente de evaluare a securității cibernetice, hacking etic şi audit de securitate
Anul II - semestrul II
Tehnici și instrumente de evaluare a securității cibernetice, hacking etic şi audit de securitate
Mecanisme de răspuns la crize din perspectiva Cyber Security
Anul II - semestrul II
Mecanisme de răspuns la crize din perspectiva Cyber Security
Investigarea infracţiunilor informatice
Anul II - semestrul II
Investigarea infracţiunilor informatice

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me