

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Ransomware attacks
social distancing
CCPA
reversing
vulnerabilities
teleworking
Ethics
capture the flag
NY SHIELD
IT security
android
ctf
Encryption
Application Penetration Test
cybersecurity
pentest
pen-test
collaborations
GDPR compliance
Coronavirus
Corelan
Web Security
self-isolation
Reverse Engineering
partnerships
GDPR
information security
community
event
Cyber Defense tool
Burp Extender
Privacy
bruteforce
cyber security
social responsibility
ICT security
computer security
Misconfigurations
TwelveSec
infosec
Web Application Penetration Testing
Mobile Security
Information Leakage
Penetration Testing
Covid-19
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.