Remote Working And Cyber Security: Analysis from OnSecurity

The continued impact of the pandemic has made working from home the new normal, rapidly accelerating digital transformation in companies of all sizes. While this is great news, there’s a […]
High networth individuals are spear phishing targets

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized access to confidential data and files.
Threat modelling: The Tool That You’ve Nerver Heard Of

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.
The Tools That We Love And You Might Aswell: Clubhouse

We love using Clubhouse to helps us develop our security projects
CVE hunting in an open-source application with OnSecurity

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.
What went wrong with TravelEx and why did it happen?

Uncovering what went wrong with TravelEx. Investigating ransomware designed to take over the network and block access to file networks.
OnSecurity uncovering what went wrong with Wishbone

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of user data available for malicious actors to share and exploit.
Cyber Security For Recruitment Companies And Their Employees

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity
Penetration Testing vs Vulnerability Scanning. Learn more

Vulnerability scans look for known vulnerabilities in your systems, while Penetration tests intend to exploit weaknesses in the architecture. How To Do….
Understanding What Is The True Cost Of A Data Breach

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.