You just completed your penetration test. Now what do you do?

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results
Server Side Template Injection with Jinja 2 for you

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.
Code Audits in Business Security – why is it important?

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.
How to become a software engineer

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer
What is Spoofing in Cyber Security?

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.
Four Founders, One Purpose: in Discussion with OnSecurity’s CCO

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.
A Guide to iOS Penetration Testing

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.
What’s the Difference Between ISO27001 and SOC 2, Type 2?

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?
Open Banking API Security Testing for Regulatory Compliance

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods, risks, and compliance best practices.
How to safely use public WiFi: risks and recommendations

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data. Read more to safeguard your online security today.