

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
pentest
GDPR
vulnerabilities
teleworking
GDPR compliance
Privacy
bruteforce
NY SHIELD
Cyber Defense tool
social responsibility
computer security
reversing
android
collaborations
ICT security
CCPA
Corelan
information security
IT security
Web Security
Encryption
Covid-19
Coronavirus
self-isolation
cyber security
community
social distancing
cybersecurity
Information Leakage
infosec
Burp Extender
TwelveSec
Application Penetration Test
pen-test
ctf
Ethics
Ransomware attacks
event
Reverse Engineering
Web Application Penetration Testing
Mobile Security
capture the flag
Misconfigurations
partnerships
Penetration Testing
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.