

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
android
bruteforce
event
GDPR compliance
capture the flag
Encryption
pentest
infosec
Privacy
Covid-19
Application Penetration Test
Cyber Defense tool
Ethics
pen-test
GDPR
Penetration Testing
CCPA
IT security
cyber security
self-isolation
Misconfigurations
ICT security
social responsibility
Coronavirus
teleworking
ctf
TwelveSec
Mobile Security
cybersecurity
Burp Extender
Corelan
Ransomware attacks
collaborations
information security
reversing
partnerships
social distancing
Reverse Engineering
community
vulnerabilities
Information Leakage
NY SHIELD
Web Security
computer security
Web Application Penetration Testing
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.