

LATEST POSTS
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
TAGS
infosec
Phising
Information Leakage
Privacy
Web Security
Corelan
Ransomware attacks
Web Application Penetration Testing
vulnerabilities
IT security
cyber security
self-isolation
event
partnerships
collaborations
Application Penetration Test
Coronavirus
security
Mobile Security
Covid-19
Penetration Testing
Cyber Defense tool
ctf
computer security
TwelveSec
teleworking
capture the flag
cybersecurity
information security
pentesting
pentest
android
Reverse Engineering
social responsibility
CCPA
pen-test
GDPR
reversing
community
social distancing
ICT security
Misconfigurations
GDPR compliance
mobile
Burp Extender
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.