CVE hunting in an open-source application with OnSecurity

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.
What went wrong with TravelEx and why did it happen?

Uncovering what went wrong with TravelEx. Investigating ransomware designed to take over the network and block access to file networks.
OnSecurity uncovering what went wrong with Wishbone

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of user data available for malicious actors to share and exploit.
Cyber Security For Recruitment Companies And Their Employees

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity
Penetration Testing vs Vulnerability Scanning. Learn more

Vulnerability scans look for known vulnerabilities in your systems, while penetration tests systemically exploit weaknesses in the architecture. Which is best for your organisation?
Pulse Connect Secure File Read Exploitation Research

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain client, nothing out of the ordinary there, but what made […]
Understanding What Is The True Cost Of A Data Breach

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.
2014’s Sony: Becoming victim of a cyber security threat

What happened in 2014 when Sony became the victim of an attack? Explore how Wiper malware was deployed and crippled the large corporation’s network.
What is Ransomware and How Do Hackers Choose their immediate Targets?

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights
Who would you like, Bob or Alice for your next penest?

Preventing complacency in testers is crucial to ensuring you have a successful test. Learn about why an alert and proactive testing approach is essential.