

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Ransomware attacks
community
Ethics
GDPR compliance
Reverse Engineering
pen-test
Misconfigurations
event
cyber security
pentest
Covid-19
Information Leakage
partnerships
ICT security
Web Security
Penetration Testing
infosec
NY SHIELD
TwelveSec
Web Application Penetration Testing
Encryption
Coronavirus
IT security
collaborations
information security
ctf
cybersecurity
Mobile Security
Cyber Defense tool
GDPR
android
teleworking
capture the flag
social distancing
Burp Extender
social responsibility
Privacy
Application Penetration Test
reversing
computer security
Corelan
CCPA
bruteforce
self-isolation
vulnerabilities
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.