

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
collaborations
social responsibility
Cyber Defense tool
Ethics
bruteforce
Covid-19
TwelveSec
event
Information Leakage
pen-test
android
pentest
CCPA
NY SHIELD
information security
Web Application Penetration Testing
Mobile Security
self-isolation
computer security
Penetration Testing
partnerships
Privacy
capture the flag
Corelan
Application Penetration Test
IT security
Reverse Engineering
Encryption
community
social distancing
Misconfigurations
infosec
ICT security
reversing
Burp Extender
Web Security
teleworking
ctf
cybersecurity
Coronavirus
GDPR compliance
GDPR
vulnerabilities
cyber security
Ransomware attacks
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.