The enquiry ordered into GCHQ’s Deal with US Amazon

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.
Pentest Files: Error Messages And Cloud Access Keys

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our testers has identified in an actual recent pen-test, so you […]
What Is The Most Damaging Virus Attack Is and Why?

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post
What Was The First Ransomware Virus And Its Importants?

One of the biggest growing problems in computer security is the growing proliferation of cyberattacks which are far more open and threatening in nature.
Who Does Social Engineering Target And Why That Target?

Explore the rise of social engineering threats. Understand how individuals are manipulated to divulge sensitive information, passwords, and financial details.
A Ransomware investigation: A Short History of Ryuk?

Dive into the alarming rise of Ryuk ransomware since 2018, which has accumulated over $150 million, showcasing its global financial impact and danger.
TryHackMe X HackerOne CTF WriteUp (Hacker Of The Hill)

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.
Method Confusion In Go SSTIs Lead To File Read And RCE

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.
How A Love Letter Changed Computer Security Forever

Delve into the fascinating narrative of how a love letter altered the landscape of computer security perpetually. Uncover this tale of technological evolution.
Understaning Zero-Day Exploit And What Can I Do About It?

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.