Recent Blogs
Hello Immersive Community!
You're already familiar with our hands-on learning and real-world scenarios to level up your cyber skills. You've seen how our labs and exercises can boost individual cap...
8 hours ago7Views
1like
0Comments
We're back with another installment of our series for managers using Crisis Sim. If you haven’t already, be sure to check out Episode 1, which covers Crisis Sim outcomes for managers.
The results a...
3 days ago8Views
2likes
0Comments
4 MIN READ
“We all know the pain of bug reports clogging up a sprint—we thought, what if we could transform that drain on time and morale into a challenge developers are excited to tackle?”
Rebecca: Oh, I lo...
8 days ago65Views
1like
0Comments
These labs will highlight the background and TTPs of Akira, a highly prolific threat actor with indiscriminate targeting, and DragonForce, a ransomware actor recently in the news, connected to the at...
10 days ago24Views
2likes
0Comments
5 MIN READ
Picture it: you’ve designed, built, and exercised your first Crisis Sim. You're pleased with the scenario and satisfied to see your team sharpen their skills, deepen their understanding, and boost th...
10 days ago55Views
4likes
0Comments
At Immersive, we recognize the exceptional efforts of organizations and individuals leading the charge in building true cyber resilience. That's why we’re thrilled to introduce the all-new Immersive ...
13 days ago115Views
3likes
1Comment
In my role, I have the privilege of working with many different organizations through their technical exercise events and programs. One of the most rewarding aspects is seeing the spark ignite in the...
13 days ago51Views
2likes
1Comment
4 MIN READ
These days, more and more jobs can benefit from being able to write simple scripts and programs, especially in cybersecurity. For example, pulling data from an API, scraping web pages, or processing ...
13 days ago23Views
1like
2Comments
4 MIN READ
Time’s Up! Congratulations to everyone who completed Lab 6: Thick Client Applications from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently ...
23 days ago152Views
2likes
4Comments
On April 16, 2025, a critical vulnerability, identified as CVE-2025-32433, was disclosed in the Erlang/OTP SSH server. This critical vulnerability allows unauthenticated attackers to execute arbitrar...
24 days ago106Views
2likes
0Comments
What is the Immersive Workday Connector?
The Immersive Workday Connector is designed to bridge the gap between our cutting-edge cybersecurity skills development platform and your organization's cor...
28 days ago39Views
1like
1Comment
Congratulations to those who completed Lab 4 of the Human Connection Challenge: Season 1! We're aware that some of you are still attempting this lab, and so community member steven has creat...
31 days ago74Views
1like
1Comment
In this blog post, I explore benefits of the integration, what it means for you, and how you can leverage it to build a world-class cybersecurity team.
Seamless access to Immersive content
Access...
31 days ago46Views
2likes
0Comments
This integration combines the hands-on, engaging learning experience of Immersive Labs with the robust learning management capabilities of Cornerstone, creating a comprehensive and efficient solution...
31 days ago24Views
2likes
0Comments
Seamless access to your Immersive data
Our REST API offers easy access to your Immersive data. Once authenticated, you can access your organization’s data by making REST API requests to any of the ...
31 days ago19Views
1like
0Comments
Time’s Up! Congratulations to everyone who completed Lab 4: Linux from the Human Connection Challenge: Season 1.
In this walkthrough, I'll share some strategies for efficiently completing the lab b...
31 days ago883Views
1like
32Comments
1 MIN READ
On the 7th April 2025, a vulnerability in the CrushFTP was added to the CISA Kev Catalogue, CrushFTP is an enterprise FTP solution with tens of thousands of instances publicly accessible online. Rece...
2 months ago42Views
1like
0Comments
7 MIN READ
CVE-2025-29812 -7.8 - DirectX Graphics Kernel Elevation of Privilege Vulnerability
A vulnerability has been identified in the Windows Kernel Memory subsystem, specifically in how DirectX components...
2 months ago56Views
1like
0Comments
Water Gamayun, also known as EncryptHub and Larva-208, is a threat actor (suspected to be of Russian origin) that has been observed exploiting a zero-day vulnerability in the Microsoft Management Con...
2 months ago91Views
2likes
0Comments
While traditional code comments focus on explaining the code's functionality, security-focused comments are crucial to promoting secure coding practices throughout the development lifecycle (SDLC). ...
2 months ago29Views
1like
0Comments