

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
cybersecurity
computer security
event
vulnerabilities
GDPR compliance
community
bruteforce
pen-test
Penetration Testing
Mobile Security
teleworking
Cyber Defense tool
Application Penetration Test
Privacy
capture the flag
Information Leakage
infosec
social distancing
Reverse Engineering
self-isolation
Encryption
partnerships
cyber security
Web Application Penetration Testing
reversing
Coronavirus
Misconfigurations
Ransomware attacks
Covid-19
Burp Extender
CCPA
collaborations
GDPR
ICT security
android
TwelveSec
ctf
social responsibility
NY SHIELD
Corelan
Web Security
Ethics
information security
IT security
pentest
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.