

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
Ethics
NY SHIELD
Covid-19
self-isolation
bruteforce
Corelan
IT security
collaborations
Web Application Penetration Testing
Application Penetration Test
CCPA
Ransomware attacks
Coronavirus
Encryption
Burp Extender
Web Security
Mobile Security
GDPR compliance
social responsibility
Cyber Defense tool
infosec
Privacy
Misconfigurations
android
vulnerabilities
partnerships
computer security
capture the flag
ICT security
social distancing
reversing
community
GDPR
Information Leakage
cybersecurity
event
cyber security
Reverse Engineering
ctf
information security
teleworking
TwelveSec
pentest
Penetration Testing
pen-test
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.