Tagscyber threat intelligence63cyber pro57content updates43expert advice37feature focus23crisis simulations20cyber crisis simulations19application security18cyber drills18tips & tricks16
Recent Blogs1 MIN READDispatches From the DesertKieranRowleyother3 MIN READRecommendations for Writing a Program Welcome EmailEllieClaytoncontent assignmentexpert adviceimmersive labsteam management3 MIN READTackling technical challenges: Attending Immersive’s cyber drill in LondonNHSCyberMancyber drillsdrill mode5 MIN READNo Sleep on State-Backed Threats: Train for Cyber Conflict Before It StartsEllaBendrickChartiercyber drillsexpert adviceimmersive labsoperational technology4 MIN READCVE-2025-53770 - Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint ServerAmarKhancyber threat intelligenceunderstanding cves1 MIN READNew CTI Labs: CVE-2025-53770 (ToolShell SharePoint RCE): Offensive and Defensivebenhopkinscontent updatescyber threat intelligencenews & announcements4 MIN READElevating Cyber Resilience: How GenAI is Revolutionizing Crisis SimulationsJamieKnoblesartificial intelligencecrisis simulationsexpert advicefeature focus4 MIN READThe secret to hosting an engaging Crisis SimTomBoylecrisis simulationsexpert advicefeature focus5 MIN READBehind the Scenes of Immersive One: How Lab Builder is a Game-Changer for Cyber ReadinessMattParvenexpert advicefeature focuslab builder3 MIN READYour Guide to Effective AI PromptingTillyCorlessartificial intelligencecrisis simulationsexpert advicefeature focus2 MIN READPeople, Not Just Firewalls: Why OT Cybersecurity Starts with TrainingSamMaesschalckexpert adviceoperational technology2 MIN READOperational Technology: What It Is, Why It Matters, and Why Cybersecurity Can’t WaitSamMaesschalckexpert adviceoperational technology5 MIN READVibe coding your way to a ZAP MCP serverRobertKlentzerisimmersive labs application security1 MIN READNew CTI Lab: CVE-2025-32463 (Sudo Chroot Elevation of Privilege): Offensivebenhopkinscontent updatescyber threat intelligencenews & announcements5 MIN READThe Human Connection Challenge Lab 5: Windows Official Walkthrough GuideStefanApostolcommunity challenge4 MIN READThe Human Edge Beyond Pentesting – Building True Cyber ResilienceDaveSpencercrisis simulationscyber drillscyber range exercisescyber rangesexpert advice1 MIN READNew CTI/OT Lab: Norwegian Dam Compromise: Campaign Analysisbenhopkinscontent updatescyber threat intelligencenews & announcementsother5 MIN READFrom XSS and SQLi to AI-generated code and supply-chain compromise: How application security is evolvingSabrinaKayaciartificial intelligenceexpert adviceimmersive labs application security6 MIN READBuilding Your First Practical Lab (Part 2)MattParvenfeature focusimmersive labslab builder5 MIN READBuilding Your First Practical Lab (Part 1)MattParvenfeature focusimmersive labslab builder
3 MIN READRecommendations for Writing a Program Welcome EmailEllieClaytoncontent assignmentexpert adviceimmersive labsteam management
3 MIN READTackling technical challenges: Attending Immersive’s cyber drill in LondonNHSCyberMancyber drillsdrill mode
5 MIN READNo Sleep on State-Backed Threats: Train for Cyber Conflict Before It StartsEllaBendrickChartiercyber drillsexpert adviceimmersive labsoperational technology
4 MIN READCVE-2025-53770 - Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint ServerAmarKhancyber threat intelligenceunderstanding cves
1 MIN READNew CTI Labs: CVE-2025-53770 (ToolShell SharePoint RCE): Offensive and Defensivebenhopkinscontent updatescyber threat intelligencenews & announcements
4 MIN READElevating Cyber Resilience: How GenAI is Revolutionizing Crisis SimulationsJamieKnoblesartificial intelligencecrisis simulationsexpert advicefeature focus
4 MIN READThe secret to hosting an engaging Crisis SimTomBoylecrisis simulationsexpert advicefeature focus
5 MIN READBehind the Scenes of Immersive One: How Lab Builder is a Game-Changer for Cyber ReadinessMattParvenexpert advicefeature focuslab builder
3 MIN READYour Guide to Effective AI PromptingTillyCorlessartificial intelligencecrisis simulationsexpert advicefeature focus
2 MIN READPeople, Not Just Firewalls: Why OT Cybersecurity Starts with TrainingSamMaesschalckexpert adviceoperational technology
2 MIN READOperational Technology: What It Is, Why It Matters, and Why Cybersecurity Can’t WaitSamMaesschalckexpert adviceoperational technology
5 MIN READVibe coding your way to a ZAP MCP serverRobertKlentzerisimmersive labs application security
1 MIN READNew CTI Lab: CVE-2025-32463 (Sudo Chroot Elevation of Privilege): Offensivebenhopkinscontent updatescyber threat intelligencenews & announcements
5 MIN READThe Human Connection Challenge Lab 5: Windows Official Walkthrough GuideStefanApostolcommunity challenge
4 MIN READThe Human Edge Beyond Pentesting – Building True Cyber ResilienceDaveSpencercrisis simulationscyber drillscyber range exercisescyber rangesexpert advice
1 MIN READNew CTI/OT Lab: Norwegian Dam Compromise: Campaign Analysisbenhopkinscontent updatescyber threat intelligencenews & announcementsother
5 MIN READFrom XSS and SQLi to AI-generated code and supply-chain compromise: How application security is evolvingSabrinaKayaciartificial intelligenceexpert adviceimmersive labs application security