

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
partnerships
Ethics
android
social distancing
infosec
Coronavirus
IT security
community
Web Application Penetration Testing
Cyber Defense tool
Covid-19
reversing
GDPR compliance
Penetration Testing
social responsibility
Information Leakage
bruteforce
self-isolation
TwelveSec
Privacy
cyber security
event
cybersecurity
teleworking
GDPR
ICT security
CCPA
NY SHIELD
ctf
Corelan
collaborations
vulnerabilities
pen-test
computer security
Application Penetration Test
Misconfigurations
Encryption
Reverse Engineering
pentest
Ransomware attacks
Burp Extender
Web Security
Mobile Security
information security
capture the flag
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.