

LATEST POSTS
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
TAGS
Burp Extender
ethical hacking
community
Web Security
pentesting
TwelveSec
Mobile Security
Reverse Engineering
Services
Cyber Defense tool
Corelan
CCPA
infosec
penetration test
cybersecurity
collaborations
pen-test
partnerships
Misconfigurations
Penetration Testing
IT security
pentest
cyber security
social distancing
Covid-19
GDPR compliance
Privacy
teleworking
Information Leakage
mobile
security
ICT security
reversing
Application Penetration Test
capture the flag
computer security
Ransomware attacks
defence
vulnerabilities
Coronavirus
ctf
social responsibility
GDPR
iot
android
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.