Learning to Self Code, Navigating Change, and Coding in the age of AI: Staff Spotlight

For National Coding Week, we reached out to some of our software developers at OnSecurity to hear their perspective on the changing role of coding in the workplace. Ben Guest […]
How to safely use Public WiFi: Risks and Recommendations

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries, and other public spaces as alternative work environments. While these settings offer a refreshing change […]
4 Founders, 1 Purpose: An Exclusive Founders Spotlight

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He practises archery in his spare time, and at twenty-nine laboured in Australia digging trenches- a […]
Understanding the Mind of a Cybercriminal

How would we define Cybercrime? What do you imagine when you think of a cybercriminal? Do you envision an erratic, reactive hacker, randomly targeting businesses from a dingy bedroom? Or […]
Pentest Files: SQL Union Injection hosted with OnSecurity

Discover now how our tester skillfully exploited multiple SQL injection vulnerabilities to extract valuable data from an application’s backend databases.
Default Tomcat Host Manager Credentials Lead to RCE

Highlighting a critical cybersecurity issue: Unauthorised access is inevitable wherever default credentials are used, underscoring the need for caution.
Typosquatting: The impact it can have on your businesses

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.
Understanding Cloud Native Security Systems – What is it?

Cloud-native security systems are transforming the way businesses protect their digital assets. Built for the cloud, these systems offer dynamic and scalable solutions to defend against evolving threats. In this blog, we’ll explore what cloud-native security systems are and why they’re essential for modern businesses.
Hybrid Cloud Security – What is it and why is it important?

Learn about the key components of hybrid cloud security and the benefits and challenges of adopting a hybrid cloud environments and setups in business.
Learning about SOC 2 (Systems and Organisation Controls 2)

Explore OnSecurity’s services and products for enhancing your organization’s security posture. Understand the importance of SOC 2 compliance requirements.