

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
CCPA
android
GDPR compliance
Coronavirus
Privacy
ICT security
IT security
self-isolation
Reverse Engineering
Misconfigurations
information security
computer security
Corelan
Ransomware attacks
social distancing
Ethics
bruteforce
Covid-19
infosec
Penetration Testing
collaborations
Web Application Penetration Testing
pen-test
ctf
cyber security
teleworking
Mobile Security
cybersecurity
GDPR
Information Leakage
TwelveSec
partnerships
event
capture the flag
Encryption
community
Burp Extender
NY SHIELD
vulnerabilities
Cyber Defense tool
social responsibility
Application Penetration Test
Web Security
reversing
pentest
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.