Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • 'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia
  • FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams
  • Vibe Coding Changed the Development Process
  • Tenable to Acquire AI Security Startup Apex
  • CISO Stature Rises, but Security Budgets Remain Tight
Skip The Hacker News

The Hacker News

  • New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
  • U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
  • New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
  • China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
  • From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
  • Threat Actors Exploit Google Apps Script to Host Phishing Sites
  • Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
  • Beware: Weaponized AI Tool Installers Infect Devices with Ransomware
  • Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
Skip Krebs on Security

Krebs on Security

  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Pakistan Arrests 21 in ‘Heartsender’ Malware Service
  • Oops: DanaBot Malware Devs Infected Their Own PCs
  • KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
  • Breachforums Boss to Pay $700k in Healthcare Breach
Skip The Cyber Post

The Cyber Post

  • China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
  • DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
  • Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
  • From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign
  • Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

EN - Maritime Cyber Security and Autonomous Operations

  1. Courses
  2. Master Courses - Cyber Security
  3. EN - Maritime Cyber Security and Autonomous Operations

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me