by George Koukoumpedakis | Jun 19, 2017 |
Every now and then during our penetration tests, we come across a Java Thick Client application which uses HTTP to communicate with a server. This allows us, of course, to intercept and manipulate requests/responses using one of our favorite tools, Burp suite. Java...
by Yiannis Koukouras | Jun 11, 2017 |
In 2016, it was the first time that Greece participated in the European Cyber Security Challenge (ECSC 2016), organized by ENISA. The formation, training and coaching of the Greek National CyberSecurity team was a purely community-driven event, organized by TwelveSec...
by Iosif Androulidakis | Jun 2, 2017 |
Introduction Unless you have been living in a cave, you most probably have heard about the General Data Protection Regulation (GDPR) fuzz. Even worse, you might be responsible for actually implementing GDPR in your company/organization. Although the fines and...
by christina | Jan 10, 2017 |
From the beginning of the Internet, sending of junk email has been prohibited. Gary Thuerk sent the first email Spam message in 1978 to 600 people. A few decades later the European Union came to regulate this issue permanently with EU Directive 2002/58/EC, 1 year...
by Matos Kapetanakis | Jul 10, 2016 |
TwelveSec and the Department of Digital Systems of the University of Piraeus are proud to be organising the Greek National Cyber Security team! ENISA (the European Union Agency for Network and Information Security) is running its annual European Cyber Security...