

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
pen-test
Reverse Engineering
Misconfigurations
Web Application Penetration Testing
Coronavirus
capture the flag
Corelan
bruteforce
NY SHIELD
Ethics
community
GDPR compliance
collaborations
ctf
information security
computer security
social distancing
Application Penetration Test
Penetration Testing
event
Web Security
Mobile Security
partnerships
android
infosec
social responsibility
cyber security
teleworking
reversing
Cyber Defense tool
TwelveSec
Encryption
pentest
Ransomware attacks
Covid-19
self-isolation
IT security
cybersecurity
Privacy
CCPA
ICT security
Information Leakage
Burp Extender
vulnerabilities
GDPR
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.