Immersive Labs Logo

About Immersive Labs

Immersive Labs has pioneered a single enterprise platform that for the first time can measure and evidence the capability of your workforce, as it relates to cyber security. Organizations using Immersive Labs can evidence cyber resilience across the whole workforce, and are kept up to date at the speed of cyber by continual cyber security training.

Closing the cybersecurity talent gap

Cybersecurity talent acquisition and retention is one of the biggest challenges security executives face in 2022. The need for skilled cybersecurity resources is ever-increasing, so competition for experienced cybersecurity pros is fierce. Meanwhile, the unpredictable and unrelenting nature of cybersecurity often leads to burnout and employee turnover issues.

By |2022-11-21T21:06:37+00:00August 5, 2022|Blog|0 Comments

Is Your Org Doing Enough to Prevent a Cybersecurity Breach? (Our research says ‘maybe not’!)

In our latest blog post, learn the human capabilities needed to respond, contain, and recover from the inevitable subset of cybersecurity breach attempts that succeed.

By |2024-03-01T11:51:18+00:00June 22, 2022|Blog|0 Comments

Patch Newsday June – No new active threats but warnings for SharePoint users, incoming Autopatch rollout, Follina zero-day fixed

A fairly quiet Patch Tuesday this month but still [...]

By |2024-03-01T11:13:59+00:00June 15, 2022|Blog|0 Comments

Patch Newsday May – NTLM relays, RDP again and the ongoing specter of Print Spooler

Security admins need to watch out for several vulnerabilities [...]

By |2024-03-01T11:14:18+00:00May 13, 2022|Blog|Comments Off on Patch Newsday May – NTLM relays, RDP again and the ongoing specter of Print Spooler

McLaren’s vision for optimizing its cyber workforce with Immersive Labs

We caught up with Ed Green, Head of Commercial Technology at McLaren, to discover his vision for optimizing the cyber workforce of the entire business.

By |2024-03-01T11:05:29+00:00January 27, 2022|Blog|Comments Off on McLaren’s vision for optimizing its cyber workforce with Immersive Labs

Take the power back: Tool-up against a notorious global threat group with our new FIN7 series

Earlier this year, a hacker found guilty for his ‘high-level’ involvement in a series of financially motivated cyberattacks received a ten-year jail sentence in Seattle.

By |2024-03-01T11:27:51+00:00September 13, 2021|Blog|Comments Off on Take the power back: Tool-up against a notorious global threat group with our new FIN7 series

Patch Newsday 10 August: Ironic exploitation and the spectre of PrintNightmare

Kev Breen, Director of Cyber Threat Research, weighs in with his thoughts on this month's Patch Tuesday.

By |2024-03-01T11:12:45+00:00August 10, 2021|Blog|Comments Off on Patch Newsday 10 August: Ironic exploitation and the spectre of PrintNightmare

An investment into the cyber skilled workforce of the future

Immersive Labs is today announcing a Series C investment of $75m with Insight Partners, Menlo Ventures, Citi Ventures and existing investor Goldman Sachs. James Hadley, CEO and Founder, shares his plans for the future of the platform.

By |2022-07-24T21:59:25+00:00June 11, 2021|Blog|Comments Off on An investment into the cyber skilled workforce of the future

It’s not all CorrectHorseBatteryStaple: How to power up your passwords in 2021

For World Password Day 2021, Kev Breen, our Director of Cyber Threat Research, weighs in with his advice on keeping your passwords safe.

By |2024-03-01T11:04:20+00:00May 6, 2021|Blog|Comments Off on It’s not all CorrectHorseBatteryStaple: How to power up your passwords in 2021

The digitalization of kidnap and extortion: a modern business dilemma

Cyberextortion is now rife online – but where did it all begin? And what, if anything, can we learn from physical extortion cases?

By |2024-03-01T11:28:50+00:00February 11, 2021|Blog|Comments Off on The digitalization of kidnap and extortion: a modern business dilemma

Cyber Crisis Simulator: Weathering the storm: public vs private crises

You can’t always anticipate a data breach. What do you do when the unexpected happens at a high-security organization? What if national secrets are now in the hands of your adversaries?

By |2024-03-01T11:46:00+00:00January 27, 2021|Blog|Comments Off on Cyber Crisis Simulator: Weathering the storm: public vs private crises

Cyberattacks are hammering businesses and public sector organizations – but when is it really a crisis?

Before dipping your toes into the considerable waters of cyber crises, you should first understand what a crisis is more broadly. That might sound elementary – it’s just a bad situation right? – but the definition runs deeper than you might think.

By |2024-03-01T10:30:12+00:00January 18, 2021|Blog|Comments Off on Cyberattacks are hammering businesses and public sector organizations – but when is it really a crisis?

Cyber Crisis Simulator: ransomware cripples major energy supplier – live it and learn

Immersive Labs’ Cyber Crisis Simulator is an online solution that drops defenders and decision makers into real-time cyber crises. The system challenges teams to make critical decisions when dealing with emerging incidents such as ransomware outbreaks, insider threats, data breaches, and spear-phishing attacks.

By |2024-03-01T10:29:27+00:00January 6, 2021|Blog|0 Comments

The Psychology of Cyber: Understanding cognitive agility as a fix for the ‘wicked problem’ of cyber crises

By |2022-12-30T21:34:18+00:00November 16, 2020|Blog|Comments Off on The Psychology of Cyber: Understanding cognitive agility as a fix for the ‘wicked problem’ of cyber crises

Upcoming Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Vulnerability

Randy Franklin Smith of Ultimate Windows Security will discuss the details around the vulnerability, how it works, and what’s at risk. Not only that but our own Director of Cyber Threat Research, Kev Breen, will be totally hands-on and demonstrate how to use this attack in red teaming using the Immersive Labs platform.

By |2024-03-01T11:38:22+00:00October 28, 2020|Blog|Comments Off on Upcoming Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Vulnerability

The key element in your cybersecurity strategy isn’t process, tech or data – it’s people

Anyone who has formulated an organizational plan knows that [...]

By |2024-03-01T11:29:04+00:00September 7, 2020|Blog|Comments Off on The key element in your cybersecurity strategy isn’t process, tech or data – it’s people

The five types of insider threats – and how to tackle them

In light of Anthony Levandowski's sentencing, we take a look at the five types of insider threats – and how you can tackle them in your own organization.

By |2024-03-01T10:40:56+00:00August 20, 2020|Blog|Comments Off on The five types of insider threats – and how to tackle them

Osterman Research Part 3: Learn and Adapt

We recently released one of the few definitive reports on cyber crisis preparedness. Compiled alongside Ostermann Research, it taps into the collective consciousness of around 400 CISOs and senior security leaders at organizations with more than 500 employees.

By |2022-07-24T21:59:36+00:00August 17, 2020|Blog|Comments Off on Osterman Research Part 3: Learn and Adapt

Osterman Research Part 2: The human element

We recently released one of the few definitive reports on cyber crisis preparedness. Compiled alongside Ostermann Research, it taps into the collective consciousness of around 400 CISOs and senior security leaders at organizations with more than 500 employees.

By |2022-07-24T21:59:36+00:00August 14, 2020|Blog|Comments Off on Osterman Research Part 2: The human element

Osterman Research Part 1: Out of sync with the threat landscape

Today, we released one of the few definitive reports on cyber crisis preparedness. Compiled alongside Ostermann Research, it taps into the collective consciousness of around 400 CISOs and senior security leaders at organizations with more than 500 employees.

By |2024-03-01T11:31:07+00:00August 12, 2020|Blog|Comments Off on Osterman Research Part 1: Out of sync with the threat landscape

Cyber preparedness lessons from the trenches

The following piece comes from a discussion with a senior security practitioner at a large global brand hit by a major cyberattack. As media, regulators and commentators scrutinized every move, its cyber crisis response played out in real time in front of a global audience. The interviewee agreed to share their story in the hope it would help shape other companies’ responses to such situations.

By |2022-07-24T21:59:37+00:00July 30, 2020|Blog|Comments Off on Cyber preparedness lessons from the trenches

CVE-2020-10560 – OSSN Arbitrary File Read

Source: https://www.businessinsider.com/coronavirus-email-scam-covid-19-phishing-false-information-who-cdc-2020-2?r=US&IR=T#check-the-senders-email-domain-and-see-if-it-matches-the-website-of-the-organization-they-say-they-work-for-then-check-the-urls-included-in-the-email-1 Open source platforms, although extremely useful and popular, [...]

By |2022-07-24T21:59:41+00:00April 16, 2020|Blog|Comments Off on CVE-2020-10560 – OSSN Arbitrary File Read

The tech behind the headlines: Iran’s cyber capability explained

Iran’s cyber capabilities have been subject to intense scrutiny in recent years due to the high political tensions within the region.

By |2023-05-19T17:09:41+00:00January 13, 2020|Blog|Comments Off on The tech behind the headlines: Iran’s cyber capability explained

Everyone’s discussing the new Windows UAC vuln – and you can explore it for FREE!

Anyone who’s anyone in security is today discussing CVE-2019-1388, a Windows privilege escalation vulnerability that exists in almost every Windows version from Windows 7 (including server versions).

By |2022-07-24T21:59:45+00:00November 20, 2019|Blog|Comments Off on Everyone’s discussing the new Windows UAC vuln – and you can explore it for FREE!

Measuring the effectiveness of your security tech is easy – but what about your people?

The problem for cybersecurity leaders is not measuring the effectiveness of technology – it is measuring the effectiveness of people.

By |2022-07-24T21:59:45+00:00September 17, 2019|Blog|Comments Off on Measuring the effectiveness of your security tech is easy – but what about your people?

Hackers have first-move advantage – that’s why defenders should learn like they do

If threat actors didn’t innovate, we would have already won.

By |2022-11-21T21:01:15+00:00August 6, 2019|Blog|Comments Off on Hackers have first-move advantage – that’s why defenders should learn like they do

Powered by Immersive Labs: Bringing Hiscox’s ‘Crack the Cube’ event to life through gamification

In May Immersive Labs helped Hiscox drum up excitement around […]

By |2022-07-24T21:59:46+00:00July 29, 2019|Blog|Comments Off on Powered by Immersive Labs: Bringing Hiscox’s ‘Crack the Cube’ event to life through gamification

Finding hidden cyber talent in your organisation: A recruitment solution

In professional team sports, coaches rarely experiment with every player at their disposal – even when they face an on-field dilemma.

By |2022-11-21T21:08:14+00:00May 16, 2019|Blog|Comments Off on Finding hidden cyber talent in your organisation: A recruitment solution

Immersive Labs’ Developer Manager makes Top 30 Women in Software

Immersive Labs is proud to announce that our developer manager, Jaycee Cheong went from tech ambassador to role model last night (08 May 2019), by being included on Makers’ Women in Software Powerlist.

By |2024-03-01T10:57:04+00:00April 22, 2019|Blog|Comments Off on Immersive Labs’ Developer Manager makes Top 30 Women in Software

In our on-demand world, why is cyber skills development still so rigid?

The way we learn is changing. Digital solutions that accommodate (and even respond to) individual needs are finally ousting traditional training methods.

By |2022-07-24T21:59:48+00:00April 2, 2019|Blog|Comments Off on In our on-demand world, why is cyber skills development still so rigid?