Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Skip to main content
VRCyberEDU
  • Home
  • More
Log in
VRCyberEDU
Home

Blocks

Skip Darkreading

Darkreading

  • An Audit Isn't a Speed Bump — It's Your Cloud Co-Pilot
  • Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
  • CISA, FBI, NSA Warn of Chinese 'Global Espionage System'
  • Hackers Steal 4M+ TransUnion Customers' Data
  • Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups
Skip The Hacker News

The Hacker News

  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
  • ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More
  • When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider
  • ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
Skip GBHackers Security | #1 Globally Trusted Cyber Security News ...

GBHackers Security | #1 Globally Trusted Cyber Security News ...

  • Criminal IP Expands into European Cybersecurity Market through Partnership with DotForce
  • Food Delivery Robots Vulnerable to Hacks That Redirect Orders
  • Microsoft Enforces MFA for Logging into Azure Portal
  • Apple May Drop Physical SIM Card in iPhone 17
  • SUSE Fleet: Plain Text Storage of Vulnerability Exploit Helm Values
Skip Krebs on Security

Krebs on Security

  • The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft
  • Affiliates Flock to ‘Soulless’ Scam Gambling Machine
  • DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
  • SIM-Swapper, Scattered Spider Hacker Gets 10 Years
  • Oregon Man Charged in ‘Rapper Bot’ DDoS Service
Skip The Cyber Post

The Cyber Post

  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
  • ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

EN - Maritime Cyber Security and Autonomous Operations

  1. Courses
  2. Master Courses - Cyber Security
  3. EN - Maritime Cyber Security and Autonomous Operations

Contact us

Follow us

Contact site support
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Get the mobile app
Play Store App Store
Powered by Moodle

This theme was developed by

Conecti.me