

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
NY SHIELD
Reverse Engineering
CCPA
Coronavirus
bruteforce
Penetration Testing
Ethics
Web Application Penetration Testing
event
TwelveSec
ICT security
Misconfigurations
Privacy
Application Penetration Test
Mobile Security
self-isolation
community
partnerships
GDPR
android
reversing
Cyber Defense tool
vulnerabilities
cyber security
infosec
information security
IT security
Burp Extender
ctf
GDPR compliance
social responsibility
Ransomware attacks
collaborations
Corelan
pentest
Covid-19
computer security
cybersecurity
teleworking
capture the flag
social distancing
Information Leakage
Encryption
pen-test
Web Security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.