

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Misconfigurations
Covid-19
computer security
Coronavirus
ICT security
event
NY SHIELD
Reverse Engineering
Privacy
social distancing
partnerships
capture the flag
community
android
self-isolation
Ethics
Web Application Penetration Testing
Application Penetration Test
ctf
Corelan
social responsibility
cyber security
Encryption
GDPR
bruteforce
teleworking
CCPA
Information Leakage
infosec
Cyber Defense tool
collaborations
reversing
TwelveSec
vulnerabilities
GDPR compliance
Burp Extender
Penetration Testing
Web Security
Ransomware attacks
pen-test
IT security
Mobile Security
cybersecurity
information security
pentest
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.