

LATEST POSTS
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
TAGS
vulnerabilities
Penetration Testing
Misconfigurations
collaborations
pentesting
self-isolation
cybersecurity
pen-test
reversing
teleworking
Covid-19
infosec
Information Leakage
GDPR
computer security
Privacy
Web Application Penetration Testing
IT security
android
pentest
community
ICT security
Cyber Defense tool
event
cyber security
partnerships
Burp Extender
Web Security
Application Penetration Test
Phising
TwelveSec
GDPR compliance
ctf
security
social responsibility
Ransomware attacks
Coronavirus
Reverse Engineering
CCPA
information security
capture the flag
social distancing
Corelan
mobile
Mobile Security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.