

LATEST POSTS
- Red Teaming – What is it and do you need it? February 5, 2025
- Introducing Tabletop Exercises (TTX) December 2, 2024
- Introducing Incident Handling November 26, 2024
- The EU NIS 2 Directive October 11, 2024
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
TAGS
Penetration Testing
community
social distancing
Burp Extender
pentesting
partnerships
Mobile Security
GDPR compliance
ethical hacking
mobile
defence
infosec
android
ICT security
Covid-19
pen-test
reversing
cyber security
Services
iot
Application Penetration Test
cybersecurity
Reverse Engineering
collaborations
vulnerabilities
security
CCPA
teleworking
TwelveSec
Corelan
pentest
Coronavirus
Privacy
Information Leakage
penetration test
Misconfigurations
Cyber Defense tool
ctf
Ransomware attacks
Web Security
capture the flag
GDPR
computer security
social responsibility
IT security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.