Recent Blogs
4 MIN READ
“We all know the pain of bug reports clogging up a sprint—we thought, what if we could transform that drain on time and morale into a challenge developers are excited to tackle?”
Rebecca: Oh, I lo...
7 hours ago14Views
1like
0Comments
These labs will highlight the background and TTPs of Akira, a highly prolific threat actor with indiscriminate targeting, and DragonForce, a ransomware actor recently in the news, connected to the at...
3 days ago19Views
2likes
0Comments
5 MIN READ
Picture it: you’ve designed, built, and exercised your first Crisis Sim. You're pleased with the scenario and satisfied to see your team sharpen their skills, deepen their understanding, and boost th...
3 days ago21Views
2likes
0Comments
At Immersive, we recognize the exceptional efforts of organizations and individuals leading the charge in building true cyber resilience. That's why we’re thrilled to introduce the all-new Immersive ...
6 days ago96Views
3likes
1Comment
In my role, I have the privilege of working with many different organizations through their technical exercise events and programs. One of the most rewarding aspects is seeing the spark ignite in the...
6 days ago43Views
2likes
1Comment
4 MIN READ
These days, more and more jobs can benefit from being able to write simple scripts and programs, especially in cybersecurity. For example, pulling data from an API, scraping web pages, or processing ...
6 days ago16Views
1like
2Comments
4 MIN READ
Time’s Up! Congratulations to everyone who completed Lab 6: Thick Client Applications from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently ...
16 days ago123Views
2likes
4Comments
On April 16, 2025, a critical vulnerability, identified as CVE-2025-32433, was disclosed in the Erlang/OTP SSH server. This critical vulnerability allows unauthenticated attackers to execute arbitrar...
17 days ago101Views
2likes
0Comments
What is the Immersive Workday Connector?
The Immersive Workday Connector is designed to bridge the gap between our cutting-edge cybersecurity skills development platform and your organization's cor...
21 days ago37Views
1like
1Comment
Congratulations to those who completed Lab 4 of the Human Connection Challenge: Season 1! We're aware that some of you are still attempting this lab, and so community member steven has creat...
24 days ago68Views
1like
1Comment
In this blog post, I explore benefits of the integration, what it means for you, and how you can leverage it to build a world-class cybersecurity team.
Seamless access to Immersive content
Access...
24 days ago42Views
2likes
0Comments
This integration combines the hands-on, engaging learning experience of Immersive Labs with the robust learning management capabilities of Cornerstone, creating a comprehensive and efficient solution...
24 days ago24Views
2likes
0Comments
Seamless access to your Immersive data
Our REST API offers easy access to your Immersive data. Once authenticated, you can access your organization’s data by making REST API requests to any of the ...
24 days ago19Views
1like
0Comments
Time’s Up! Congratulations to everyone who completed Lab 4: Linux from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently completing the lab b...
24 days ago817Views
1like
32Comments
1 MIN READ
On the 7th April 2025, a vulnerability in the CrushFTP was added to the CISA Kev Catalogue, CrushFTP is an enterprise FTP solution with tens of thousands of instances publicly accessible online. Rece...
30 days ago39Views
1like
0Comments
7 MIN READ
CVE-2025-29812 -7.8 - DirectX Graphics Kernel Elevation of Privilege Vulnerability
A vulnerability has been identified in the Windows Kernel Memory subsystem, specifically in how DirectX components...
30 days ago47Views
1like
0Comments
Water Gamayun, also known as EncryptHub and Larva-208, is a threat actor (suspected to be of Russian origin) that has been observed exploiting a zero-day vulnerability in the Microsoft Management Con...
2 months ago86Views
2likes
0Comments
While traditional code comments focus on explaining the code's functionality, security-focused comments are crucial to promoting secure coding practices throughout the development lifecycle (SDLC). ...
2 months ago28Views
1like
0Comments
Time’s Up! Congratulations to everyone who completed Lab 5: Windows from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently completing the lab...
2 months ago234Views
2likes
4Comments
Supply chain security is all about protecting your organization from risks and threats that come from external parties and processes you rely on. But trust, like code, is a dependency. And risk? That...
2 months ago24Views
1like
0Comments