Blog
Read the Immersive Labs blog to learn more about cybersecurity labs, the pitfalls of classroom cyber training, threat monitoring, and more.
Sign up for blog updates
Stay updated with our latest blog posts.
Patch Newsday May – NTLM relays, RDP again and the ongoing specter of Print Spooler
Blog
Patch Tuesday
3 May 2022
How we connect across the globe in sales13 April 2022
Patch Newsday April – Pre-Easter PatchesBlog
Patch Tuesday
12 April 2022
To pay, or not to pay, how to think clearly about ransomware demandsBlog
6 April 2022
Flexible working: at home, visiting friends, working holiday, and the office!All posts
Patch Newsday May – NTLM relays, RDP again and the ongoing specter of Print Spooler
Blog
Patch Tuesday
How we connect across the globe in sales
Patch Newsday April – Pre-Easter Patches
Blog
Patch Tuesday
To pay, or not to pay, how to think clearly about ransomware demands
Blog
Flexible working: at home, visiting friends, working holiday, and the office!
Spring4Shell: Java vulnerabilities bounce back into the headlines
Cyber Workforce Summit 2022: Reflections from a behavioural scientist
Day in the life of Charlotte, Crisis Sim Content Specialist
Application security – understanding the human capability issue
AppSec
International Women’s Day: break the bias
Strengthening cybersecurity teams’ capabilities: Cyber Workforce Benchmark 2022
Blog
In the News
Secure engineering: Why are security headers so important?
Blog
My career story: 18 months at Immersive Labs. What a ride!
Life at Immersive Labs
Measuring global human cyber capabilities: Report
Blog
In the News
Free and open defensive cyber labs
A day in the life of Evander Pierre, Web Developer
Life at Immersive Labs
Everyone needs cloud security: here’s why
Blog
Cloud Security
House of cards: surviving a supply chain attack
Blog
Cyber Crisis Sim
Parental Leave Adventures in a Campervan
Life at Immersive Labs
Patch Newsday February 2022: Small But Mighty
Patch Tuesday
Threats
Immersive Labs channel boss named CRN Channel Chief for 2022!
In the News
Immersive Labs signs up to Tech Zero campaign
In the News
Sustainability
SureMDM vulnerability could lead to supply chain compromise
Vulnerabilities
McLaren’s vision for optimizing its cyber workforce with Immersive Labs
Guest Blog
Immersive Labs signs MOU with UAE Government to develop nationwide cyber skills
In the News
Patch Newsday: Christmas Chaos or Silent Night?
Patch Tuesday
Everything you need to know about Log4Shell (CVE-2021-44228)
Threats
Helping McLaren stay cyber resilient off the track, so they can perform on it
Blog
In the News
My hidden disability
Netgear vulnerabilities could put small business routers at risk
Threats
Why You Shouldn’t Blindly Trust the Software Supply Chain
AppSec
Blog
Welcoming Snap Labs to the team – and accelerating towards the future of Immersive Labs
Blog
In the News
Patch Newsday: Wild CVEs & CISA Directives
Blog
Patch Tuesday
A day in the life of Rob, Product Designer
Life at Immersive Labs
Patch Newsday: 12 October 2021 – Spooky Spooler and Sinister Scores
Patch Tuesday
Building cyber resilience for the Financial Services sector with breadth and at scale
In the News
OWASP Top 10 2021 has finally landed – here’s why you should care
AppSec
Financial Sector Insider Threat: Master Key Compromise
Cyber Crisis Sim
Threats
Patch Newsday: 14 September 2021 – Lousy Browsers and Arsey RCEs
Patch Tuesday
Analyzing the CVE-2021-40444 exploit
Free Labs
In the News
Take the power back: Tool-up against a notorious global threat group with our new FIN7 series
Red Team
Threats
Patch Newsday 10 August: Ironic exploitation and the spectre of PrintNightmare
Patch Tuesday
Kaseya supply chain attack: Prepare to respond with the Cyber Crisis Simulator
Cyber Crisis Sim
Disclosure Dilemmas: Vulnerable Stalkerware
When Less Isn’t More: A Deep Dive into Exploiting the Less.js RCE
Vulnerabilities
Patch Newsday – 13 July 2021
Patch Tuesday
Stalkerware 101: Everything you need to know
An investment into the cyber skilled workforce of the future
In the News
Patch Newsday – 8 June 2021
Patch Tuesday
Frustrations of an AppSec Engineer Part 2: Lost in Translation
AppSec
Welcome to the DarkSide: where IT and OT Collide
Cyber Crisis Sim
DarkSide
Frustrations of an AppSec Engineer Part 1: Collaboration, Collaboration, Collaboration
It makes you WannaCry: Anti-Ransomware Day 2021
Ransomware
Patch Newsday: May 11, 2021
Patch Tuesday
It’s not all CorrectHorseBatteryStaple: How to power up your passwords in 2021
Webinar
Wagtail XSS + LocalStorage = Account Hijack
Research
Neurodiversity is my superpower!
Life at Immersive Labs
Stepping into the Future: Immersive Labs joins Future Fifty 9.0
Life at Immersive Labs
Interdependence and teamwork: managing crises effectively
Cyber Crisis Sim
Patch Newsday: April 13, 2021
Patch Tuesday
Wicked problems: navigating crises when there’s no clear path
Cyber Crisis Sim
Play along with our new crisis scenario – Insider Threat: Pharma Drama!
Cyber Crisis Sim
Webinar
The People of InfoSec on the People of InfoSec: The Thought Leader’s View
Cyber Humans
SaltStack: further injection vulnerabilities
CVEs
Threats
Immersive Labs Chooses Global Channel-First Strategy With 50 New Partners and Transparent Structure
Press Release
The View from the CISO’s Chair
Cyber Humans
Hands-on with Hafnium: Proxylogon evolves
CVEs
Threats
Patch Newsday: March 10, 2021
Patch Tuesday
Threats
Introducing your vehicle’s nervous system, CANBus
International Women’s Day 2021: Choose to Challenge
Life at Immersive Labs
The People of InfoSec on the People of InfoSec
Cyber Humans
One-day exploit party with SaltStack
Why so salty? Local privilege escalation on SaltStack minions
Vulnerabilities
Diverse organizations build high-performing crisis response teams. Here’s how.
Blog
New package management flaw: dependency confusion
Vulnerabilities
Being out in the workplace: Why being open matters
Life at Immersive Labs
The digitalization of kidnap and extortion: a modern business dilemma
Cyber Crisis Sim
Ransomware
Patch Newsday: February 9, 2021
Patch Tuesday
Threats
The Time to Make History is Now
Blog
Life at Immersive Labs
Facebook probably knows you better than you do – should you be worried?
Webinar: Cybersecurity CTFs – The power of competition in building attack-ready humans
Blog
Webinar
Cyber Crisis Simulator: Weathering the storm: public vs private crises
Blog
Cyber Crisis Sim
Introduction to Static Code Analysis for Reverse Engineering
Continuous integration means continuously embedding security skills
AppSec
Blog
Cyberattacks are hammering businesses and public sector organizations – but when is it really a crisis?
Cyber Crisis Sim
Immersive Labs is officially one of the best places to work in Boston!
Cyber Crisis Simulator: ransomware cripples major energy supplier – live it and learn
Cyber Crisis Sim
When the sun bursts: responding to global cyber events
Cyber Crisis Sim
Feel the heat of SUNBURST with Immersive Labs (so your business won’t have to)
Free Labs
Threats
The Psychology of Cyber: How to build cognitive agility with micro-drilling
The Psychology of Cyber: How to build cognitive agility with micro-drilling
Blog
Cyber Crisis Sim
The Psychology of Cyber: Understanding cognitive agility as a fix for the ‘wicked problem’ of cyber crises
Blog
Cyber Crisis Sim
What is AppSec, and why do you need it?
AppSec
The Psychology of Cyber: Why thinking on your feet is critical to cyber crisis response
Blog
Cyber Crisis Sim
Remembrance Sunday Special: How a career in cyber is helping veterans adapt
Blog
Digital Cyber Academies
Halloween: can you solve the murder mystery in our new series?
Blog
Free Labs
Upcoming Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Vulnerability
Randy Franklin Smith
Ultimate Windows Security
Test your cyber mettle for free: Immersive Labs Community is now in public beta
Blog
In the News
Research: Can you build spyware for a Fitbit?
Blog
Research
The more the merrier: four ways to build a more diverse cybersecurity team
Blog
Think cyberattacks only hurt financially? Think again
Blog
Cyber Crisis Sim
Staying cyber-safe in a remote working world
Blog
Cyber Crisis Sim
Guest Blog: The Stress and Joy of Security Jobs
Blog
Five steps every business should implement before ransomware strikes
Blog
A sign we’re on the right Track
Blog
The key element in your cybersecurity strategy isn’t process, tech or data – it’s people
Blog
If your cyber training isn’t gamified, it isn’t right
Blog
Gamified
InfoSec MythBusters: quelling common misconceptions
Blog
Cyber crisis: Respond as a whole
Blog
Cyber Crisis Sim
CREST cancellations expose a wider problem with perception of cyber skills
Blog
The five types of insider threats – and how to tackle them
Cyber Crisis Sim
Osterman Research Part 3: Learn and Adapt
Blog
Cyber Crisis Sim
Osterman Research Part 2: The human element
Blog
Cyber Crisis Sim
Osterman Research Part 1: Out of sync with the threat landscape
Blog
Cyber Crisis Sim
From decisions to decryption – live the Garmin ransomware attack with Immersive Labs
Blog
Cyber Crisis Sim
Cyber preparedness lessons from the trenches
Blog
Cyber Crisis Sim
Build capabilities, not just plans
Blog
Cyber Crisis Sim
Most organizations now expect to be hacked, so why is incident response being neglected?
Blog
Cyber Crisis Sim
Hacking in Hollywood: our experts review
Blog
Less stress, more success: how psychological safety affects your team’s performance
Blog
Revolutionizing the tabletop exercise: Step into the Cyber Crisis Simulator
Blog
Cyber Crisis Sim
What does it take to keep young hackers on the right path?
Blog
From Mitigation To Exploitation
Blog
Threats
Powering Cyber Skills with KPMG
Blog
Events
The Evolution of Ransomware
Blog
Threats
Supercharge your cyber decision making skills with storytelling
Blog
Exercising
Can you really evidence human cyber readiness?
Blog
Evidencing
New vulnerability in popular Android banker Anubis reported to authorities
Blog
In the News
Sign in with Apple vulnerability: lessons to learn
Blog
Threats
When is a security vulnerability not a vulnerability?
Blog
Red Team
What are red teams and which human traits help them succeed?
Blog
Red Team
CISSP now equivalent to a master’s – but what are they really worth?
Blog
It’s been three years since WannaCry, so we asked our experts – where were you?
Blog
In the News
How to lock onto the hackers targeting SaltStack minions
Blog
Hackers are currently attacking vulnerable SaltStack systems – here’s how
Blog
Free Labs
How the crisis is unveiling the true cost of classroom cyber training
Blog
Threat monitoring with AttackerKB
Blog
How the current crisis is exposing the pitfalls of classroom cyber training
Blog
When a cyberattack hits you need a prepared security team – not certificates
Blog
Six ransomware strains that demonstrate attacker innovation
Blog
CVE-2020-10560 – OSSN Arbitrary File Read
Blog
Covid-19 Phishing Emails: How to Spot Them
Blog
In the News
Defining NICE work roles: Cyber Defense Analyst
Blog
Frameworks
We need to do more to help our CISOs – here’s why
Blog
Defining NICE work roles: Vulnerability Assessment Analyst
Blog
Frameworks
Defining NICE work roles: Cyber Crime Investigator
Blog
Frameworks
Defining NICE work roles: Cyber Defense Forensics Analyst
Blog
Frameworks
China vs Equifax: A timeline of alleged cyber espionage
Blog
In the News
Defining NICE work roles: Cyber Defense Incident Responder
Blog
Frameworks
Codename Shitrix: attackers scramble to exploit CVE-2019-19781
Blog
RSA Conference 2020
Blog
Events
The tech behind the headlines: Iran’s cyber capability explained
Blog
In the News
teissLondon2020: The European Information Security Summit
Blog
Events
Travelex vs Sodinokibi: A cyber crisis timeline
Blog
In the News
Reflecting on… Immersive Focus
Blog
Events
Immersive Labs: The best of 2019
Blog
Free Labs
Immersive Labs Unearths Vulnerability in Aviatrix VPN
Blog
Free Labs
Everyone’s discussing the new Windows UAC vuln – and you can explore it for FREE!
Blog
Free Labs
A tame BlueKeep: Get hands-on with the exploit in our free lab
Blog
Free Labs
Measuring the effectiveness of your security tech is easy – but what about your people?
Blog
Evidencing
Why MITRE ATT&CK™ is THE cybersecurity framework in 2019
Blog
Frameworks
Hackers have first-move advantage – that’s why defenders should learn like they do
Blog
The future of cyber defense is in the hands of entire workforces
Blog
Capital One breach: security tech only as effective as the human configuring it
Blog
In the News
Powered by Immersive Labs: Bringing Hiscox’s ‘Crack the Cube’ event to life through gamification
Blog
Events
The countdown to Black Hat has begun
Blog
Events
How the ICO’s £183m BA fine should focus businesses on sharpening cyber skills at speed
Blog
In the News
Want to upskill at the speed of cyber? Then it’s time to break out of the training room
Blog
Exercising
US Government looks to boost cyber skills with gamified national contest
Blog
How cyber security frameworks are aiding skills development and assessment
Blog
Frameworks
Learn how your decisions affect cyber risk in real time
Blog
Exercising
What is password spraying and how can you defend against it?
Blog
Free Labs
Why developing cyber skills is never game over
Blog
Equipping
Finding hidden cyber talent in your organisation: A recruitment solution
Blog
Cyber security talent is expensive – so why not develop your own?
Blog
Immersive Labs’ Developer Manager makes Top 30 Women in Software
Blog
Life at Immersive Labs
In our on-demand world, why is cyber skills development still so rigid?
Blog
Equipping
“Humans are underrated”: Why AI in cybersecurity isn’t a case of us or them
Blog
Meet us @CYBERUK 2019
Blog
Events
RSA 2019 – Highlights
Blog
Events
Government report states UK boards must improve cyber awareness – but how remains unclear
Blog
CompTIA and Immersive Labs issue penetration testing challenge
Blog
Events
Exploiting SS7 to intercept text messages
Blog
Free Labs
Meet us at Cloud & Cyber Security Expo 2019
Blog
Events
APT10 – Quasar RAT analysis
Blog
Free Labs
Why we’re yet to see the full potential of threat intelligence
Blog
Gamification is the key to making cyber learning addictive
Blog
Equipping
The rise of financial fraud
Blog
Death of the classroom
Blog