Rapid7’s Project Sonar uncovered by Security Engineer

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the journey now within cybersecurity now.
Email Phishing Explained – ‘Foot In The Door’ For Hackers

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals
Investigation: Pentesting PostgreSQL with SQL Injections

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app using the Postgres DMBS. We will take a look into bypass methods for web application […]
You just completed your penetration test. Now what do you do?

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results
Server Side Template Injection with Jinja 2 for you

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.
Code Audits in Business Security – why is it important?

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.
How to become a software engineer

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer
What is Spoofing in Cyber Security?

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.
Four Founders, One Purpose: in Discussion with OnSecurity’s CCO

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.
A Guide to iOS Penetration Testing

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.