

LATEST POSTS
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
TAGS
Information Leakage
mobile
Ransomware attacks
ICT security
Penetration Testing
collaborations
ctf
GDPR compliance
CCPA
Reverse Engineering
cybersecurity
Services
ethical hacking
pentest
Coronavirus
pen-test
social responsibility
Misconfigurations
iot
Mobile Security
Corelan
Cyber Defense tool
reversing
capture the flag
infosec
TwelveSec
partnerships
cyber security
social distancing
pentesting
vulnerabilities
Covid-19
IT security
android
security
GDPR
community
Privacy
defence
teleworking
Web Security
Application Penetration Test
computer security
Burp Extender
penetration test
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.