Basic knowledge to get started with Penetration Testing

Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what actually is. As most online resources will mention,...

Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228)

Introduction This article presents a widespread critical issue that affects many Java applications. Specifically, as per CVE-2021-44228, Apache Log4j2 JNDI features used in configuration, log...

EU GDPR vs Virginia CDPA

This blogpost will try to provide a comparison guide concerning the EU General Data Protection Regulation and the Virginia Consumer Data Protection Act. On the 2nd of March, 2021, the Virginia...

Data protection around the world – Part II

As we have already mentioned in our previous blog post, data protection is among the global leading trends. So, let’s expand our and check out what other data protection regulations are...

Data protection around the world

This blogpost will try to provide an overview regarding data protection regulations which are applicable around the world, and additional information on which countries are considered by the EU to...