The enquiry ordered into GCHQ’s Deal with US Amazon

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.
Pentest Files: Error Messages And Cloud Access Keys

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our testers has identified in an actual recent pen-test, so you […]
What Is The Most Damaging Virus Attack Is and Why?

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post
3 Simple Steps to Zero-Day Threat Protection

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.
Cloud Hesitancy in Cyber – Why do people question it?

The myths surrounding cloud security hesitancy. Gain clarity on common misconceptions and make informed decisions about cloud-based security solutions.
Computer Hacker Gains Access to Florida City’s Water Supply

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and successfully increased the amount of sodium hydroxide.
Is it true, do Macs get infected with malware more easily?

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?
File upload tricks and checklist

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.
A guide to implementing gRPC services worldwide

Unravel the simplicity of gRPC with Project Crobat. Learn to streamline development with gRPC and empower your projects. Dive into our blog for insights!
Method Confusion In Go SSTIs Lead To File Read And RCE

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.