

LATEST POSTS
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
TAGS
collaborations
Penetration Testing
mobile
security
GDPR compliance
infosec
CCPA
Services
cyber security
defence
pentesting
penetration test
IT security
partnerships
social responsibility
Ransomware attacks
iot
reversing
community
ethical hacking
Mobile Security
Application Penetration Test
Web Security
Privacy
TwelveSec
ICT security
Coronavirus
Corelan
Misconfigurations
pen-test
teleworking
social distancing
Reverse Engineering
vulnerabilities
pentest
GDPR
Burp Extender
Cyber Defense tool
capture the flag
computer security
ctf
Covid-19
android
Information Leakage
cybersecurity
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.