• About Us
  • Pentest
    Overview

    Our approach to pentesting

    Web Application

    Web apps, web servers & websites

    Mobile Application

    iOS, Android and other apps

    LLM & AI Application

    Red Team LLM & AI pentesting

    Cloud Security

    AWS, Azure and GCP testing

    Physical Penetration

    Onsite security assessment

    External Infrastructure

    Perimeter defence testing

    Internal Infrastructure

    Internal network & insider threats

    Social Engineering

    In-depth, highly-targeted phishing

    Phishing Simulation

    Phishing testing & awareness

  • Platform Features
  • Resources
    Resource Hubs
    Cloud Security Hub

    All you need to know about Cloud Security

    Penetration Testing Hub

    All you need to know about Penetration Testing

    Guides

    Topical whitepapers that dive into the current state of affairs

    Latest Articles

    Banner image reads: web application pentesting vs network pentesting: what's the difference?
    Banner image reads: Secure by Design in Practice: A guide for government product and delivery teams" with a gradient blue background
    See All Articles
  • Customers
    Testimonials

    What people are saying about the service at OnSecurity

    Case Studies

    From Engineering to Enterprise Security: How a Renowned Automotive Business Closed Critical Gaps with OnSecurity

    Secure and Streamlined: Why Countingup Chooses OnSecurity for Annual Testing

    Why Early-Stage Security Testing Builds Client Trust

    Driving Secure Growth Through Seamless Testing

    See All Case Studies
  • Events
  • Contact
Get Your Quote. Instantly.
  • Start Your Instant Quote
  • About Us
  • Pentest
    • Penetration Testing Services
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing Services
    • Cloud Penetration Testing Services
    • Physical Penetration Testing
    • External Infrastructure Penetration Testing
    • Internal Infrastructure Penetration Testing
    • Social Engineering Penetration Testing
    • Phishing Penetration Testing Services
    • LLM & AI Red Teaming and Penetration Testing
  • Platform Features
    • External Vulnerability Scanning
    • Threat Intelligence & Web Scanning
  • Resources
    • Cloud Security Hub
    • Penetration Testing Hub
    • OnSecurity’s Latest Articles, News and Industry Tips
  • Customers
    • Case Studies: The Stories of Success
    • Testimonials of Cybersecurity Success
  • Events
  • Contact

Deep dive: The Enquiry Ordered Into GCHQ’s Deal With Amazon

Amazon Enquiry

Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times (FT) reports. This has raised concerns over how data […]

When Sony BMG Exposed Millions To Malware Attacks and Why

Malware

Sony is a gigantic multipartite corporation that has been prone to multiple different types of hacks, find out why and how they improve their security posture

The Secret to Google’s Security, you can find out here

The Secrets To Googles Security

Catch Of The Week Did you know that Google has never been the victim of a successful phishing attack? Not bad for a company of 140,000 staff and counting. 2021 saw the amount of phishing […]

Info – CVE-2021-44228: Apache log4j Remote Code Execution

Zero Day

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.

Phishing – ‘Is It Still One of The Biggest Cyber Threat?’

Phishing Biggest Cyber Threat

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

The Secret to Google’s Security, find out more here

The Secrets To Googles Security

Google’s very impressive record: Zero successful phishing attacks on a massive workforce of 140,000+ employees. Discover their security success story.

The enquiry ordered into GCHQ’s Deal with US Amazon

Amazon Enquiry 1

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.

Pentest Files: Error Messages And Cloud Access Keys

Cloud Access Keys

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our testers has identified in an actual recent pen-test, so you […]

What Is The Most Damaging Virus Attack Is and Why?

Cyber Attack Malware Virus

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post

What Was The First Ransomware Virus And Its Importants?

Ransomware Virus

One of the biggest growing problems in computer security is the growing proliferation of cyberattacks which are far more open and threatening in nature.

← previous
Next →
Connect with OnSecurity—your global cybersecurity partner. Reach out for incident response, threat intelligence, or strategic collaboration. We're here to secure your digital future.

The OnSecurity founders spent a collective 40 years as professional ethical hackers. This experience has given us a unique insight into the hacker mindset, and how the modern cyber-crime industry works. We use this experience to protect our customers from modern hackers.

Quick Links
  • Careers at OnSecurity
  • Log in
  • Careers at OnSecurity
  • Log in
Legal
  • Privacy Policy
  • Cookie Policy
  • Terms & Conditions
  • Responsible Vulnerability Disclosure Program
  • Privacy Policy
  • Cookie Policy
  • Terms & Conditions
  • Responsible Vulnerability Disclosure Program
Get In Touch
  • contact@onsecurity.io
Twitter Linkedin

© 2026 All rights reserved OnSecurity Technology Limited
Company registered in England and Wales. Registered number: 14184026 Registered office: 1 Victoria Street, Bristol, England, BS1 6AA. 

  • Privacy Policy
  • Cookie Policy
  • Terms & Conditions
  • Responsible Vulnerability Disclosure Program
  • Privacy Policy
  • Cookie Policy
  • Terms & Conditions
  • Responsible Vulnerability Disclosure Program