

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Ethics
Encryption
bruteforce
GDPR compliance
Burp Extender
Application Penetration Test
self-isolation
NY SHIELD
Web Application Penetration Testing
Mobile Security
Coronavirus
Covid-19
reversing
computer security
Privacy
Penetration Testing
android
event
vulnerabilities
Corelan
collaborations
cyber security
Ransomware attacks
Misconfigurations
teleworking
GDPR
pentest
Reverse Engineering
information security
CCPA
Web Security
ctf
TwelveSec
pen-test
infosec
IT security
social responsibility
cybersecurity
ICT security
Information Leakage
social distancing
capture the flag
partnerships
community
Cyber Defense tool
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.