Recent Blogs
Recently, a critical zero-day vulnerability affecting on-premise SharePoint servers, identified as CVE-2025-53770, was uncovered. This vulnerability allows for authentication bypass, leading to remot...
5 days ago114Views
4likes
1Comment
Cyber threats have become a pervasive force within the business world, elevating the need for regular cyber resilience exercises into an organization-wide imperative.
Genuine resilience is about m...
5 days ago10Views
0likes
0Comments
Before I start, it’s important to take a moment to acknowledge that I’m privileged to work with some fantastic experts.
Immersive’s Crisis Sim lead, JonPaulGabriele, is our very own Daedalus, for...
8 days ago39Views
1like
0Comments
“The best customer feedback we got was, we don’t need you to do everything for us.”
Rebecca: Wait, seriously?
Matt: Never more so. We built Lab Builder, a powerful Immersive One platform ...
12 days ago33Views
2likes
0Comments
3 MIN READ
Why Prompting Matters for Crisis Simulations
Think of AI as a highly intelligent, but literal, assistant. The quality of its output directly reflects the clarity and specificity of your instruction...
13 days ago44Views
1like
0Comments
The wake-up call no one wanted
Just after midnight on September 22, 2024, a suspected ransomware attack forced operators at the Arkansas City, Kansas, water-treatment plant to switch to manual cont...
19 days ago48Views
1like
0Comments
What is OT?
Operational technology refers to the hardware and software systems that monitor and control physical devices, processes, and infrastructure. This includes everything from the syste...
20 days ago37Views
1like
0Comments
5 MIN READ
If you haven’t heard already, Model Context Protocol (MCP) is a new, standardised way that LLMs and AI agents can communicate with external tools. Lots of people in the AI community have been calling...
26 days ago52Views
1like
0Comments
On June 30, 2025, the Stratascale Cyber Research Unit (CRU) team identified a critical local privilege escalation vulnerability in sudo, tracked as CVE-2025-32463. This vulnerability, related to sudo...
26 days ago51Views
1like
0Comments
Time’s Up! Congratulations to everyone who completed Lab 5: Windows from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently completing the lab...
28 days ago692Views
2likes
8Comments
The Human Edge Beyond Pentesting – Building True Cyber Resilience
Pentest vs. Red Team: Understanding the Core Difference
Many cybersecurity vendors are rebadging pentesting as attack simulations...
29 days ago15Views
1like
0Comments
We have received reports of a cyber incident that occurred at the Lake Risevatnet Dam, near Svelgen, Norway, in April 2025. A threat actor gained unauthorized access to a web-accessible Human-Machine...
2 months ago257Views
1like
0Comments
Keeping up with vulnerabilities is like playing a never-ending game of whack-a-mole. One day, we were knee-deep in XSS payloads and buffer overflows; the next, developers everywhere were plugging SQL...
2 months ago75Views
2likes
0Comments
This is the second blog in a 2 part series that will walk you through the entire process of building your first custom practical lab. You’ll learn how to do everything from launching and configuring ...
2 months ago53Views
2likes
0Comments
This is the first blog in a 2 part series that will walk you through the entire process of building your first custom practical lab. You’ll learn how to do everything from launching and configuring a...
2 months ago65Views
1like
0Comments
Time’s Up! Congratulations to everyone who completed Lab 4: Linux from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently completing the lab b...
2 months ago1.4KViews
1like
33Comments
Neurodiversity advocate and my own personal hero, Chris Packham, recently made a series for the BBC titled Inside Our Minds. It focused on giving a voice to neurodivergent individuals by creating sho...
2 months ago58Views
3likes
1Comment
We're in an age of rapid digitization. Different industries are embracing technologies like artificial intelligence (AI) and cloud solutions, driven by the ambition to shift from analog to digital.
...
2 months ago29Views
1like
0Comments
Another vulnerability patched was released during Microsoft's June 2025 patch Tuesday review! An important elevation of privilege vulnerability was listed, and if exploited successfully, attackers ca...
2 months ago87Views
0likes
0Comments
In a world of ever-evolving tactics, techniques, procedures (TTPs) and relentless adversaries, it’s no longer enough for defenders to simply monitor, detect, and respond. You can’t wait for next-gen ...
2 months ago42Views
2likes
0Comments