

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
capture the flag
Covid-19
CCPA
Ransomware attacks
Web Application Penetration Testing
bruteforce
reversing
IT security
partnerships
self-isolation
Burp Extender
Coronavirus
cybersecurity
Misconfigurations
Information Leakage
Encryption
Corelan
Reverse Engineering
NY SHIELD
social distancing
collaborations
event
ctf
teleworking
ICT security
GDPR
GDPR compliance
Ethics
Web Security
TwelveSec
infosec
vulnerabilities
cyber security
social responsibility
Cyber Defense tool
Mobile Security
Application Penetration Test
Privacy
computer security
Penetration Testing
android
pentest
community
information security
pen-test
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.