Understaning Zero-Day Exploit And What Can I Do About It?

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.
Investigation: Why was LinkedIn targetted by phishing scams?

Explore the methods targeting LinkedIn users through phishing scams and gain insights into the everyday tactics used by cybercriminals to exploit you further.
Cybercriminals Demand $70m Ransom In ‘Colossal’ Attack

Uncover the latest threat looming over government servers. The newfound vulnerability impacts Microsoft systems, leaving government infrastructures at risk.
Read: Pulse Connect Secure File Read Exploitation Research

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.
Remote Working And Cyber Security: Analysis from OnSecurity

The continued impact of the pandemic has made working from home the new normal, rapidly accelerating digital transformation in companies of all sizes. While this is great news, there’s a […]
High networth individuals are spear phishing targets

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized access to confidential data and files.
Threat modelling: The Tool That You’ve Nerver Heard Of

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.
The Tools That We Love And You Might Aswell: Clubhouse

We love using Clubhouse to helps us develop our security projects
OnSecurity uncovering what went wrong with Wishbone

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of user data available for malicious actors to share and exploit.
Cyber Security For Recruitment Companies And Their Employees

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity