

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
ctf
Cyber Defense tool
partnerships
Web Application Penetration Testing
self-isolation
Corelan
vulnerabilities
Information Leakage
Mobile Security
teleworking
Web Security
Encryption
social distancing
Penetration Testing
NY SHIELD
ICT security
computer security
TwelveSec
Privacy
community
bruteforce
collaborations
cyber security
social responsibility
Ransomware attacks
GDPR compliance
Coronavirus
capture the flag
event
infosec
pentest
Ethics
Burp Extender
information security
cybersecurity
Covid-19
GDPR
Application Penetration Test
android
CCPA
Misconfigurations
pen-test
reversing
Reverse Engineering
IT security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.