

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Coronavirus
social distancing
Encryption
Burp Extender
community
Application Penetration Test
cybersecurity
Information Leakage
Privacy
collaborations
pen-test
social responsibility
GDPR
vulnerabilities
self-isolation
android
pentest
Web Application Penetration Testing
bruteforce
infosec
teleworking
information security
Reverse Engineering
Mobile Security
TwelveSec
GDPR compliance
ctf
capture the flag
Misconfigurations
computer security
reversing
Ransomware attacks
cyber security
Covid-19
Web Security
Cyber Defense tool
partnerships
Ethics
IT security
event
NY SHIELD
ICT security
Corelan
CCPA
Penetration Testing
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.