OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Sever Side Template Injection With Jinja2
Vulnerabilities & Hacking

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass

Gain Access To Burp Collaborator Sessions
Vulnerabilities & Hacking

Discover how you use Burpsuite Collaborator persistently for enhanced cybersecurity testing. Now it’s possible to

Pentesting Postgresql With Sql Injections2 1
Pentesting

Join Gus, explore advanced techniques for detecting and exploiting SQL Injection vulnerabilities in PostgreSQL-based web

New Feature Online Estimates
Pentesting

Effortlessly obtain a penetration testing quote online without sales calls. Experience a streamlined, hassle-free process

Rapid7S Project Sonar2
Vulnerabilities & Hacking

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the

Careless With Curl Dont Be
Vulnerabilities & Hacking

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security

New Blog Banners 30
News and Industry Trends

Defend against BlueKeep’s looming threats. Insights on securing systems from potential widespread attacks and common

Abusing Kerberos From
Vulnerabilities & Hacking

Explore Kerberos abuse techniques on Linux with our comprehensive guide. Delve into the available tools

Banner Image Reads: &Quot;What Is Spear Phishing And How Does It Differ From Normal Phishing?&Quot; With A Blue Background.
Vulnerabilities & Hacking

Learn the definition of spear phishing and the potential threats it poses to businesses in

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities,

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.