

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Cyber Defense tool
Web Application Penetration Testing
IT security
Information Leakage
teleworking
Web Security
Burp Extender
information security
pen-test
computer security
event
cybersecurity
TwelveSec
Reverse Engineering
vulnerabilities
capture the flag
social responsibility
self-isolation
NY SHIELD
partnerships
ctf
Mobile Security
Covid-19
GDPR
Encryption
community
social distancing
Privacy
Corelan
Coronavirus
Misconfigurations
cyber security
CCPA
collaborations
ICT security
Penetration Testing
Application Penetration Test
infosec
GDPR compliance
android
reversing
pentest
Ransomware attacks
Ethics
bruteforce
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.