

LATEST POSTS
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
- War is Never the Answer February 22, 2022
- Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
- EU GDPR vs Virginia CDPA April 22, 2021
- Data protection around the world – Part II March 31, 2021
- Data protection around the world March 24, 2021
TAGS
infosec
cyber security
partnerships
Penetration Testing
cybersecurity
Ransomware attacks
Reverse Engineering
Ethics
GDPR compliance
GDPR
CCPA
Web Security
Misconfigurations
computer security
TwelveSec
teleworking
NY SHIELD
vulnerabilities
information security
social distancing
Corelan
ctf
Encryption
social responsibility
ICT security
android
pen-test
Application Penetration Test
self-isolation
Coronavirus
Covid-19
community
reversing
capture the flag
Cyber Defense tool
Privacy
Mobile Security
Burp Extender
Information Leakage
collaborations
event
pentest
Web Application Penetration Testing
bruteforce
IT security
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.