

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
information security
Web Application Penetration Testing
GDPR compliance
bruteforce
Privacy
infosec
cybersecurity
Ethics
teleworking
Penetration Testing
vulnerabilities
event
ICT security
collaborations
community
pen-test
self-isolation
GDPR
IT security
Application Penetration Test
ctf
Mobile Security
pentest
social responsibility
android
reversing
computer security
Burp Extender
Ransomware attacks
Encryption
partnerships
Information Leakage
Cyber Defense tool
Covid-19
TwelveSec
social distancing
Coronavirus
Web Security
capture the flag
Misconfigurations
Reverse Engineering
Corelan
CCPA
cyber security
NY SHIELD
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.