CyberSim
Digital Classroom
CyberSim is an expanding digital classroom aimed at educating users of all backgrounds about modern digital vulnerabilities.
CyberSim is an expanding digital classroom aimed at educating users of all backgrounds about modern digital vulnerabilities.
Computer Security topics handpicked by us to provide up-to-date information regarding vulnerabilities relevant to the average internet user.
A common form of social engineering, malicious users may attempt to obtain sensitive information by impersonating trusted entities through emails, messages or websites.
Learn more Not AttemptedPoor password practices pose a significant threat to user identity due to advances in attacks, and have contributed to countless data breaches.
Learn more Not AttemptedMalware that encrypts files and usually demands payment for their decryption. Modern encryption methods can render data both inaccessible and computationally infeasible to reverse.
Learn more Not AttemptedWide-spread web advertising makes embedded ads a common target for distributing malware, and often involves users unknowingly infecting themselves from compromised links.
Learn more Not AttemptedInstead of targeting a web application or user, attacks may be launched to overload a network or system, usually disrupting availability to users by flooding it with traffic.
Learn more Not AttemptedWe're always looking to expand our list of cybersecurity topics. Please feel free to recommend topics you'd like to be covered in the future!
FeedbackThe OWASP Top Ten is a standard awareness document for developers and is updated yearly to represent the ten most critical security risks for web applications.
Access controls are controls set to prevent users from acting outside of their intended permissions. When these fail, users may gain access beyond their authorisation.
Learn more Not AttemptedMany web applications and APIs use insufficient or outdated methods to protect data. These methods are computationally insecure and leave sensitive data vulnerable to theft.
Learn more Not AttemptedFlaws in code can leave web applications vulnerable to code injections, allowing attackers to execute unintended commands against a database or access sensitive data.
Learn more Not AttemptedDevelopment of secure software requires adequate pre-coding setup. When web applications fail to analyse requirements and threats, it opens itself to vulnerabilities.
Learn more Not AttemptedSoftware configuration directly contributes to security. Improper configurations can lead to leakage of sensitive information and overlooked vulnerabilities.
Learn more Not AttemptedWeb applications often feature components such as libraries and frameworks. Components with vulnerabilities can undermine application defenses.
Learn more Not AttemptedApplication functions related to user authentication are often implemented poorly, allowing attackers to bypass security features and exploit other vulnerabilities.
Learn more Not AttemptedSoftware failures refer to code and infrastructure that fails to protect against integrity violations, usually when applications fail to verify the integrity of compromised software.
Learn more Not AttemptedWhen systems fail to sufficiently log, monitor and respond to incidents, breaches can remain undetected for extended periods of time, allowing for potential further damage.
Learn more Not AttemptedWhen web applications fail to validate a user-supplied URL, attackers can forge requests to bypass security features and reach unintended destinations.
Learn more Not Attempted