Tagscyber threat intelligence61cyber pro57content updates42expert advice33feature focus21cyber crisis simulations19application security18crisis simulations17tips & tricks16cyber team simulations15
Recent Blogs5 MIN READBehind the Scenes of Immersive One: How Lab Builder is a Game-Changer for Cyber ReadinessMattParvenexpert advicefeature focuslab builder3 MIN READYour Guide to Effective AI PromptingTillyCorlessartificial intelligencecrisis simulationsexpert advicefeature focus2 MIN READPeople, Not Just Firewalls: Why OT Cybersecurity Starts with TrainingSamMaesschalckexpert adviceoperational technology2 MIN READOperational Technology: What It Is, Why It Matters, and Why Cybersecurity Can’t WaitSamMaesschalckexpert adviceoperational technology5 MIN READVibe coding your way to a ZAP MCP serverRobertKlentzerisimmersive labs application security1 MIN READNew CTI Lab: CVE-2025-32463 (Sudo Chroot Elevation of Privilege): Offensivebenhopkinscontent updatescyber threat intelligencenews & announcements5 MIN READThe Human Connection Challenge Lab 5: Windows Official Walkthrough GuideStefanApostolcommunity challenge4 MIN READThe Human Edge Beyond Pentesting – Building True Cyber ResilienceDaveSpencercrisis simulationscyber drillscyber range exercisescyber rangesexpert advice1 MIN READNew CTI/OT Lab: Norwegian Dam Compromise: Campaign Analysisbenhopkinscontent updatescyber threat intelligencenews & announcementsother5 MIN READFrom XSS and SQLi to AI-generated code and supply-chain compromise: How application security is evolvingSabrinaKayaciartificial intelligenceexpert adviceimmersive labs application security6 MIN READBuilding Your First Practical Lab (Part 2)MattParvenfeature focusimmersive labslab builder5 MIN READBuilding Your First Practical Lab (Part 1)MattParvenfeature focusimmersive labslab builder6 MIN READThe Human Connection Challenge Lab 4: Linux Official Walkthrough GuideStefanApostolchallenges & scenarioscommunity challenge3 MIN READBeyond the Gap: Why Neurodivergent Minds Are Cyber's FuturePamelaSmithother3 MIN READFrom Abstract to Action: Immersive One's Compliance SolutionMarieHargravescrisis simulationsexpert advice1 MIN READNew CTI Lab: CVE-2025-33073 (SMB Elevation of Privilege): Defensivebenhopkinscontent updatescyber threat intelligencenews & announcements4 MIN READHasta La Vista, Passive Defense: Why Blue Teams Need an Offensive EdgeEllaBendrickChartierimmersive labs1 MIN READNew CTI Lab: Stealth Falcon (CVE-2025-33053) – WebDAV Server Remote Code ExecutionBenMcCarthycontent updatescyber threat intelligence4 MIN READUrgent Security Alert: Critical Flaw in CrushFTP Puts Your Data at Risk (CVE-2025-31161)KitHudsoncyber threat intelligencemitre att&ckunderstanding cves3 MIN READFeature Focus: Crisis Sim Presentation Mode Upliftsharrietmartin7crisis simulationsexpert advicefeature focus
5 MIN READBehind the Scenes of Immersive One: How Lab Builder is a Game-Changer for Cyber ReadinessMattParvenexpert advicefeature focuslab builder
3 MIN READYour Guide to Effective AI PromptingTillyCorlessartificial intelligencecrisis simulationsexpert advicefeature focus
2 MIN READPeople, Not Just Firewalls: Why OT Cybersecurity Starts with TrainingSamMaesschalckexpert adviceoperational technology
2 MIN READOperational Technology: What It Is, Why It Matters, and Why Cybersecurity Can’t WaitSamMaesschalckexpert adviceoperational technology
5 MIN READVibe coding your way to a ZAP MCP serverRobertKlentzerisimmersive labs application security
1 MIN READNew CTI Lab: CVE-2025-32463 (Sudo Chroot Elevation of Privilege): Offensivebenhopkinscontent updatescyber threat intelligencenews & announcements
5 MIN READThe Human Connection Challenge Lab 5: Windows Official Walkthrough GuideStefanApostolcommunity challenge
4 MIN READThe Human Edge Beyond Pentesting – Building True Cyber ResilienceDaveSpencercrisis simulationscyber drillscyber range exercisescyber rangesexpert advice
1 MIN READNew CTI/OT Lab: Norwegian Dam Compromise: Campaign Analysisbenhopkinscontent updatescyber threat intelligencenews & announcementsother
5 MIN READFrom XSS and SQLi to AI-generated code and supply-chain compromise: How application security is evolvingSabrinaKayaciartificial intelligenceexpert adviceimmersive labs application security
6 MIN READThe Human Connection Challenge Lab 4: Linux Official Walkthrough GuideStefanApostolchallenges & scenarioscommunity challenge
3 MIN READFrom Abstract to Action: Immersive One's Compliance SolutionMarieHargravescrisis simulationsexpert advice
1 MIN READNew CTI Lab: CVE-2025-33073 (SMB Elevation of Privilege): Defensivebenhopkinscontent updatescyber threat intelligencenews & announcements
4 MIN READHasta La Vista, Passive Defense: Why Blue Teams Need an Offensive EdgeEllaBendrickChartierimmersive labs
1 MIN READNew CTI Lab: Stealth Falcon (CVE-2025-33053) – WebDAV Server Remote Code ExecutionBenMcCarthycontent updatescyber threat intelligence
4 MIN READUrgent Security Alert: Critical Flaw in CrushFTP Puts Your Data at Risk (CVE-2025-31161)KitHudsoncyber threat intelligencemitre att&ckunderstanding cves
3 MIN READFeature Focus: Crisis Sim Presentation Mode Upliftsharrietmartin7crisis simulationsexpert advicefeature focus