

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
IT security
reversing
Corelan
android
event
social distancing
community
Privacy
bruteforce
cybersecurity
Reverse Engineering
Ethics
NY SHIELD
ICT security
Covid-19
GDPR
cyber security
pentest
Ransomware attacks
Web Security
social responsibility
teleworking
Cyber Defense tool
ctf
CCPA
Information Leakage
Encryption
infosec
Mobile Security
information security
self-isolation
Web Application Penetration Testing
TwelveSec
Application Penetration Test
vulnerabilities
GDPR compliance
Coronavirus
pen-test
capture the flag
Misconfigurations
collaborations
computer security
Burp Extender
partnerships
Penetration Testing
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.