

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Covid-19
CCPA
ctf
collaborations
cyber security
GDPR
social distancing
social responsibility
TwelveSec
teleworking
vulnerabilities
ICT security
Cyber Defense tool
Corelan
community
Coronavirus
GDPR compliance
pen-test
NY SHIELD
capture the flag
information security
Burp Extender
cybersecurity
reversing
partnerships
android
Mobile Security
Encryption
computer security
Ethics
IT security
Information Leakage
Misconfigurations
Reverse Engineering
pentest
Ransomware attacks
Application Penetration Test
bruteforce
Privacy
self-isolation
Web Security
Web Application Penetration Testing
event
Penetration Testing
infosec
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.