Blog
Read the Immersive Labs blog to learn more about cybersecurity labs, the pitfalls of classroom cyber training, threat monitoring, and more.
20 January 2021
Continuous integration means continuously embedding security skills18 January 2021
Cyberattacks are hammering businesses and public sector organizations – but when is it really a crisis?11 January 2021
Immersive Labs is officially one of the best places to work in Boston!6 January 2021
Cyber Crisis Simulator: ransomware cripples major energy supplier – live it and learnAll posts
Introduction to Static Code Analysis for Reverse Engineering
25 January 2021
Continuous integration means continuously embedding security skills
20 January 2021
Cyberattacks are hammering businesses and public sector organizations – but when is it really a crisis?
18 January 2021
Immersive Labs is officially one of the best places to work in Boston!
11 January 2021
Cyber Crisis Simulator: ransomware cripples major energy supplier – live it and learn
6 January 2021
When the sun bursts: responding to global cyber events
22 December 2020
Feel the heat of SUNBURST with Immersive Labs (so your business won’t have to)
18 December 2020
The Psychology of Cyber: How to build cognitive agility with micro-drilling
17 December 2020
The Psychology of Cyber: How to build cognitive agility with micro-drilling
24 November 2020
The Psychology of Cyber: Understanding cognitive agility as a fix for the ‘wicked problem’ of cyber crises
16 November 2020
What is AppSec, and why do you need it?
11 November 2020
The Psychology of Cyber: Why thinking on your feet is critical to cyber crisis response
9 November 2020
Remembrance Sunday Special: How a career in cyber is helping veterans adapt
8 November 2020
Halloween: can you solve the murder mystery in our new series?
30 October 2020
Upcoming Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Vulnerability
28 October 2020
Test your cyber mettle for free: Immersive Labs Community is now in public beta
12 October 2020
Research: Can you build spyware for a Fitbit?
9 October 2020
The more the merrier: four ways to build a more diverse cybersecurity team
30 September 2020
Think cyberattacks only hurt financially? Think again
28 September 2020
Staying cyber-safe in a remote working world
24 September 2020
Guest Blog: The Stress and Joy of Security Jobs
21 September 2020
Five steps every business should implement before ransomware strikes
17 September 2020
A sign we’re on the right Track
7 September 2020
The key element in your cybersecurity strategy isn’t process, tech or data – it’s people
7 September 2020
If your cyber training isn’t gamified, it isn’t right
1 September 2020
InfoSec MythBusters: quelling common misconceptions
28 August 2020
Cyber crisis: Respond as a whole
27 August 2020
CREST cancellations expose a wider problem with perception of cyber skills
26 August 2020
The five types of insider threats – and how to tackle them
20 August 2020
Osterman Research Part 3: Learn and Adapt
17 August 2020
Osterman Research Part 2: The human element
14 August 2020
Osterman Research Part 1: Out of sync with the threat landscape
12 August 2020
From decisions to decryption – live the Garmin ransomware attack with Immersive Labs
6 August 2020
Cyber preparedness lessons from the trenches
30 July 2020
Build capabilities, not just plans
29 July 2020
Most organizations now expect to be hacked, so why is incident response being neglected?
28 July 2020
Hacking in Hollywood: our experts review
23 July 2020
Less stress, more success: how psychological safety affects your team’s performance
21 July 2020
Revolutionizing the tabletop exercise: Step into the Cyber Crisis Simulator
20 July 2020
What does it take to keep young hackers on the right path?
16 July 2020
From Mitigation To Exploitation
13 July 2020
Powering Cyber Skills with KPMG
10 July 2020
The Evolution of Ransomware
9 July 2020
Supercharge your cyber decision making skills with storytelling
2 July 2020
Can you really evidence human cyber readiness?
22 June 2020
New vulnerability in popular Android banker Anubis reported to authorities
19 June 2020
Sign in with Apple vulnerability: lessons to learn
8 June 2020
When is a security vulnerability not a vulnerability?
4 June 2020
What are red teams and which human traits help them succeed?
3 June 2020
CISSP now equivalent to a master’s – but what are they really worth?
26 May 2020
It’s been three years since WannaCry, so we asked our experts – where were you?
15 May 2020
How to lock onto the hackers targeting SaltStack minions
6 May 2020
Hackers are currently attacking vulnerable SaltStack systems – here’s how
6 May 2020
How the crisis is unveiling the true cost of classroom cyber training
5 May 2020
Threat monitoring with AttackerKB
30 April 2020
How the current crisis is exposing the pitfalls of classroom cyber training
28 April 2020
When a cyberattack hits you need a prepared security team – not certificates
23 April 2020
Six ransomware strains that demonstrate attacker innovation
21 April 2020
CVE-2020-10560 – OSSN Arbitrary File Read
16 April 2020
Covid-19 Phishing Emails: How to Spot Them
7 April 2020
Defining NICE work roles: Cyber Defense Analyst
4 March 2020
We need to do more to help our CISOs – here’s why
4 March 2020
Defining NICE work roles: Vulnerability Assessment Analyst
2 March 2020
Defining NICE work roles: Cyber Crime Investigator
27 February 2020
Defining NICE work roles: Cyber Defense Forensics Analyst
25 February 2020
China vs Equifax: A timeline of alleged cyber espionage
13 February 2020
Defining NICE work roles: Cyber Defense Incident Responder
6 February 2020
Codename Shitrix: attackers scramble to exploit CVE-2019-19781
16 January 2020
RSA Conference 2020
15 January 2020
The tech behind the headlines: Iran’s cyber capability explained
13 January 2020
teissLondon2020: The European Information Security Summit
8 January 2020
Travelex vs Sodinokibi: A cyber crisis timeline
8 January 2020
Reflecting on… Immersive Focus
18 December 2019
Immersive Labs: The best of 2019
17 December 2019
Immersive Labs Unearths Vulnerability in Aviatrix VPN
4 December 2019
Everyone’s discussing the new Windows UAC vuln – and you can explore it for FREE!
20 November 2019
A tame BlueKeep: Get hands-on with the exploit in our free lab
23 September 2019
Measuring the effectiveness of your security tech is easy – but what about your people?
17 September 2019
Why MITRE ATT&CK™ is THE cybersecurity framework in 2019
5 September 2019
Hackers have first-move advantage – that’s why defenders should learn like they do
6 August 2019
The future of cyber defense is in the hands of entire workforces
31 July 2019
Capital One breach: security tech only as effective as the human configuring it
30 July 2019
Powered by Immersive Labs: Bringing Hiscox’s ‘Crack the Cube’ event to life through gamification
29 July 2019
The countdown to Black Hat has begun
16 July 2019
How the ICO’s £183m BA fine should focus businesses on sharpening cyber skills at speed
10 July 2019
Want to upskill at the speed of cyber? Then it’s time to break out of the training room
10 July 2019
US Government looks to boost cyber skills with gamified national contest
25 June 2019
How cyber security frameworks are aiding skills development and assessment
15 June 2019
Learn how your decisions affect cyber risk in real time
12 June 2019
What is password spraying and how can you defend against it?
10 June 2019
Why developing cyber skills is never game over
30 May 2019
Finding hidden cyber talent in your organisation: A recruitment solution
16 May 2019
Cyber security talent is expensive – so why not develop your own?
1 May 2019
Immersive Labs’ Developer Manager makes Top 30 Women in Software
22 April 2019
In our on-demand world, why is cyber skills development still so rigid?
2 April 2019
“Humans are underrated”: Why AI in cybersecurity isn’t a case of us or them
28 March 2019
Meet us @CYBERUK 2019
27 March 2019
RSA 2019 – Highlights
15 March 2019
Government report states UK boards must improve cyber awareness – but how remains unclear
11 March 2019
CompTIA and Immersive Labs issue penetration testing challenge
4 March 2019
Exploiting SS7 to intercept text messages
1 March 2019
Meet us at Cloud & Cyber Security Expo 2019
12 February 2019
APT10 – Quasar RAT analysis
29 January 2019
Why we’re yet to see the full potential of threat intelligence
7 January 2019
Gamification is the key to making cyber learning addictive
29 November 2018
The rise of financial fraud
23 November 2018
Death of the classroom
24 October 2018