MeVitae has chosen top talent again: A Pentest Partnership

Learn how OnSecurity’s portal-first penetration testing approach helped MeVitae accelerate quoting, booking, and remediation, outpacing other vendors.
Yonder chooses OnSecurity as its Cybersecurity partner

A new case study uncovering our real-time reporting, transparent pricing, and a seamless onboarding process making us the trusted choice for pentesting.
What is PCI DSS, why do you need it and how do you secure it?

Discover the purpose of PCI DSS: securing card payments. OnSecurity offers PCI segmentation pentesting for businesses, ensuring a secure payment environment.
Pentest Findings: Bypassing Freemium with client-side security controls

Discover how one of our pentesters found that client-side security controls hadn’t been enabled in our customer’s target application, allowing them to access features reserved for paying customers, as well as how we fixed it.
What is a Penetration Test and why is it important for your business?

Penetration testing is a mostly manual process carried out by experienced consultants, using some of the same methods and tools a real hacker would. You decide on the scope of your test with your consultant, set your target, and your tester will get to work attempting to breach it. This blog will explore the importance of pentesting for businesses, and how to begin.
Pentest Files: Docker Breakout Are you Taking Precautions?

Explore Docker’s security aspects: Understand how taking precautions is crucial to avoid vulnerabilities in this widely-used containerization platform.
Stealing Amazon EC2 Creds via Server Side Request Forgery

Explore our technique of using Server Side Request Forgery (SSRF) to successfully retrieve EC2 credentials, demonstrating advanced cybersecurity tactics.
Gaining Admin Access with a simple Password Reset…

A simple bug in the ‘forgotten password’ and password reset mechanism led to a malicious takeover of an entire target application. Find out how this was fixed and secured.
Radar: How And Why You Can Stamp Out Fashion Fraud

Uncover strategies for recognizing impending phishing attacks. This post details our proactive approach in warning a customer about a serious fraud attempt.
OnSecurity’s Essential Cybersecurity Checklist for 2023

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data and systems from unauthorised access and threats.