Recent Blogs
1 MIN READ
Today, we’ve released two brand-new labs focusing on defending against and exploiting two new vulnerabilities in Palo Alto Firewalls! Learn how to attack a Palo Alto Firewall by exploiting these vuln...
15 hours ago24Views
0likes
0Comments
Starting today we will begin releasing a series of all-new Challenge Labs. Each month you’ll be given the chance to showcase your cybersecurity skills across a range of topics and climb the Season 1 ...
3 days ago889Views
6likes
26Comments
What is Assess and Recommend?
The Assess and Recommend feature was created with the end user in mind and helps determine the most appropriate content based on a learner’s knowledge and experience. ...
7 days ago83Views
5likes
3Comments
4 MIN READ
The question begs for a prioritisation exercise. You need to create a dynamic program structure to address security priorities and the highest-volume threats, while keeping your finger on the pu...
7 days ago68Views
6likes
3Comments
Imagine defending against a major cyberattack while standing in the shadow of football history. That's exactly what the Immersive Labs community did last month...
7 days ago45Views
5likes
1Comment
5 MIN READ
CVE-2024-49039 - 8.8 - Windows Task Scheduler Elevation of Privilege Vulnerability
Microsoft has released an official patch for this vulnerability because the exploit code found is functional and h...
8 days ago53Views
1like
0Comments
In this blog, we’ll cover what this feature is and how you can use it.
For this release, we’ve made creation as easy as possible. Just click Create with AI, add a title, and select options for orga...
10 days ago190Views
4likes
1Comment
On November 4, 2024, Securonix published research and identified a novel attack chain where attackers deploy a custom Linux machine using the QEMU emulation service to persist on endpoints, allowing ...
15 days ago35Views
3likes
1Comment
1 MIN READ
Today, we have released a brand new lab on identifying indicators of compromise to do with a new persistence mechanism on Windows! You will understand how the technique works and do some threat hunti...
22 days ago55Views
1like
0Comments
This Cybersecurity Results Month we’re acknowledging the organizations and individuals who have shown exceptional dedication to learning and defending against emerging threats, building organizationa...
24 days ago229Views
4likes
10Comments
Cobalt Strike is an adversary simulation tool developed by Fortra. Cobalt Strike was designed to be used by professional red teams to perform post-exploitation actions such as enumerating file system...
25 days ago52Views
3likes
2Comments
🧛♀️ Brace yourselves, brave souls! The haunted season has returned, and with it, an all-new cybersecurity adventure—Halloween 2024: Return to Haunted Hollow. The sinister spirits of cyberspace awai...
28 days ago677Views
12likes
17Comments
2 MIN READ
What is CVE-2024-30051?
CVE-2024-30051 is a vulnerability in the Microsoft Windows Desktop Window Manager (DWM) Core Library that allows attackers to gain SYSTEM-level privileges and execute arbitr...
2 months ago47Views
1like
0Comments
As we celebrate Cybersecurity Results Month, it's time to recognize the organizations and individuals who have shown exceptional dedication to learning and defending against emerging threats, buildin...
2 months ago85Views
2likes
1Comment
Organizing engaging, informative, and enjoyable cybersecurity events like Swisscom's Hacktober event doesn't have to be daunting. With strategic groundwork and relevant, interactive challenges, you c...
2 months ago121Views
6likes
2Comments
CVE-2024-5910 (Palo Alto Expedition) - Defensive
Identify signs of exploitation in event logs and extract indicators of compromise
CVE-2024-5910 (Palo Alto Expedition) - Offensive
Use publicly ...
2 months ago42Views
4likes
0Comments
5 MIN READ
CVE-2024-43572 - 7.8 - Microsoft Management Console Remote Code Execution Vulnerability
Top of the list for patching should be a vulnerability in the Microsoft Management Console. While the CVSS sc...
2 months ago86Views
4likes
2Comments
2 MIN READ
When you think of a “cozy bear”, you might think of Winnie the Pooh or a faux fur throw by the fire, not a criminal hacker group that’s been active since 2008.
There was an intrusion to TeamViewer,...
2 months ago153Views
9likes
4Comments
Earlier this week I attended a Cyber Drill in London, it taught me a lot about the power of community in cybersecurity
2 months ago77Views
2likes
1Comment
In this article, we’ll examine CVE-2024-1086, a recently discovered privilege escalation vulnerability affecting various Linux distributions.
2 months ago64Views
2likes
0Comments