LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Burp Extender
ICT security
Mobile Security
GDPR
Web Application Penetration Testing
Application Penetration Test
event
reversing
cybersecurity
Corelan
GDPR compliance
Web Security
Reverse Engineering
teleworking
cyber security
community
Penetration Testing
vulnerabilities
CCPA
Coronavirus
information security
capture the flag
NY SHIELD
computer security
infosec
android
Information Leakage
collaborations
Covid-19
Misconfigurations
pen-test
IT security
bruteforce
ctf
TwelveSec
Ransomware attacks
Cyber Defense tool
Privacy
social responsibility
partnerships
social distancing
Encryption
self-isolation
pentest
Ethics
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.