What is API Penetration Testing?

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.
What is SOC 2 (Systems and Organisation Controls 2)?

Explore OnSecurity’s services and products for enhancing your organisation’s security posture. Understand the importance of SOC 2 compliance requirements.
ISO 27001 Certification – Everything you need to know

Unravel the essentials of ISO 27001 certification in this blog. Explore critical insights and guidelines for a robust security management system.
NIST Framework: What is it and why is it important?

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.
Typosquatting and the impact it can have on your businesses

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.
The Threat Intelligence Tool by OnSecurity

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats
In the know: Top SaaS Cybersecurity Threats in 2023

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and systems.
Pentest Files: More EC2 Credential Retrieval through Server-Side Request Forgery

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.
Record-Breaking Data Breaches 2021

Delve into an overview of 2021’s significant data breaches. Explore the most notable incidents and learn from them for better data security practices.
Spot a Phishing Email: Protecting Your Inbox from Threats

Phishing emails are very common. They are spam emails that land in your inbox or junk folder that imitate a real-life, well-known company (or even someone you may know) and ask you to provide them with sensitive information. Be it usernames, passwords or card details, these cybercriminals will aim to get what they need to ‘hack’ you further and can cause many issues including financial loss.