CyberSim

Digital Classroom

CyberSim is an expanding digital classroom aimed at educating users of all backgrounds about modern digital vulnerabilities.

VULNERABILITIES

Computer Security topics handpicked by us to provide up-to-date information regarding vulnerabilities relevant to the average internet user.

Phishing

A common form of social engineering, malicious users may attempt to obtain sensitive information by impersonating trusted entities through emails, messages or websites.

Learn more Not Attempted

Password Malpractice

Poor password practices pose a significant threat to user identity due to advances in attacks, and have contributed to countless data breaches.

Learn more Not Attempted

Ransomware

Malware that encrypts files and usually demands payment for their decryption. Modern encryption methods can render data both inaccessible and computationally infeasible to reverse.

Learn more Not Attempted

Malicious Advertising

Wide-spread web advertising makes embedded ads a common target for distributing malware, and often involves users unknowingly infecting themselves from compromised links.

Learn more Not Attempted

Denial of Service

Instead of targeting a web application or user, attacks may be launched to overload a network or system, usually disrupting availability to users by flooding it with traffic.

Learn more Not Attempted

More Coming Soon!

We're always looking to expand our list of cybersecurity topics. Please feel free to recommend topics you'd like to be covered in the future!

Feedback

OWASP's TOP 10

The OWASP Top Ten is a standard awareness document for developers and is updated yearly to represent the ten most critical security risks for web applications.

Broken Access Control

Access controls are controls set to prevent users from acting outside of their intended permissions. When these fail, users may gain access beyond their authorisation.

Learn more Not Attempted

Cryptographic Failures

Many web applications and APIs use insufficient or outdated methods to protect data. These methods are computationally insecure and leave sensitive data vulnerable to theft.

Learn more Not Attempted

Injection

Flaws in code can leave web applications vulnerable to code injections, allowing attackers to execute unintended commands against a database or access sensitive data.

Learn more Not Attempted

Insecure Design

Development of secure software requires adequate pre-coding setup. When web applications fail to analyse requirements and threats, it opens itself to vulnerabilities.

Learn more Not Attempted

Security Misconfiguration

Software configuration directly contributes to security. Improper configurations can lead to leakage of sensitive information and overlooked vulnerabilities.

Learn more Not Attempted

Vulnerable Components

Web applications often feature components such as libraries and frameworks. Components with vulnerabilities can undermine application defenses.

Learn more Not Attempted

Identification Failures

Application functions related to user authentication are often implemented poorly, allowing attackers to bypass security features and exploit other vulnerabilities.

Learn more Not Attempted

Software Failures

Software failures refer to code and infrastructure that fails to protect against integrity violations, usually when applications fail to verify the integrity of compromised software.

Learn more Not Attempted

Security Logging Failures

When systems fail to sufficiently log, monitor and respond to incidents, breaches can remain undetected for extended periods of time, allowing for potential further damage.

Learn more Not Attempted

Server-Side Request Forgery

When web applications fail to validate a user-supplied URL, attackers can forge requests to bypass security features and reach unintended destinations.

Learn more Not Attempted