

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Covid-19
GDPR compliance
Ethics
Information Leakage
ICT security
partnerships
collaborations
infosec
IT security
self-isolation
Penetration Testing
Corelan
android
teleworking
social responsibility
event
capture the flag
NY SHIELD
TwelveSec
CCPA
cyber security
bruteforce
cybersecurity
Mobile Security
information security
Burp Extender
social distancing
Reverse Engineering
Coronavirus
Web Security
vulnerabilities
pen-test
Misconfigurations
GDPR
reversing
Ransomware attacks
community
Privacy
Web Application Penetration Testing
computer security
ctf
Encryption
Cyber Defense tool
pentest
Application Penetration Test
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.