

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
vulnerabilities
pen-test
Privacy
self-isolation
social responsibility
Corelan
CCPA
Web Security
infosec
cybersecurity
Encryption
bruteforce
social distancing
Cyber Defense tool
Reverse Engineering
reversing
Mobile Security
Ethics
NY SHIELD
community
IT security
ctf
Application Penetration Test
Information Leakage
Ransomware attacks
collaborations
event
GDPR
partnerships
Coronavirus
GDPR compliance
Covid-19
ICT security
pentest
computer security
Penetration Testing
information security
TwelveSec
Web Application Penetration Testing
android
cyber security
capture the flag
Burp Extender
Misconfigurations
teleworking
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.