OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

New Blog Banners 10
News and Industry Trends

For National Coding Week, we reached out to some of our software developers at OnSecurity

12
Vulnerabilities & Hacking

How would we define Cybercrime? What do you imagine when you think of a cybercriminal?

16
News and Industry Trends

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He

30
News and Industry Trends

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries,

Banner Image Reads: 'Soc 2: Why Is It So Important?&Quot;
Pentesting

Explore OnSecurity’s services and products for enhancing your organization’s security posture. Understand the importance of

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases,

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security,

Banner Image Reads: &Quot;Default Tomcat Host Manager Credentials Lead To Rce&Quot;
Pentesting

Highlighting a critical cybersecurity issue: Unauthorised access is inevitable wherever default credentials are used, underscoring

Sql Union Injection
Pentesting

Discover now how our tester skillfully exploited multiple SQL injection vulnerabilities to extract valuable data

Banner Image Reads: &Quot;Hybrid Cloud Security: Why It'S Important For Your Business&Quot;
News and Industry Trends

Learn about the key components of hybrid cloud security and the benefits and challenges of

Banner Image Reads: &Quot;Understanding Cloud Native Security Systems&Quot; With A Blue Background.
Pentesting

Cloud-native security systems are transforming the way businesses protect their digital assets. Built for the

New Blog Banners 16 1
News and Industry Trends

Uncover strategies for recognizing impending phishing attacks. This post details our proactive approach in warning

Blue Banner Image Reads: Password Reset Bugs: How They Work And The Risks They Pose&Quot; In White Text.
Pentesting

Here Tristan demonstrates how to reset any user’s password by altering the password reset functionality,

Banner Image Reads: &Quot;Error Message And Cloud Access Keys: The Risks Of Exposing Aws Keys&Quot;
Pentesting

Unveiling the risks of exposing cloud acces keys – particularly in reference to AWS (amazon

Banner Image Reads &Quot;Stealing Amazon Ec2 Creds Via Server Side Request Forgery&Quot;
Pentesting

Explore our technique of using Server Side Request Forgery (SSRF) to successfully retrieve EC2 credentials,

New Blog Banners 10
News and Industry Trends

For National Coding Week, we reached out to some of our software developers at OnSecurity to hear their perspective on

Banner Image Reads: &Quot;Hybrid Cloud Security: Why It'S Important For Your Business&Quot;
News and Industry Trends

Learn about the key components of hybrid cloud security and the benefits and challenges of adopting a hybrid cloud environments and setups in business.

New Blog Banners 16 1
News and Industry Trends

Uncover strategies for recognizing impending phishing attacks. This post details our proactive approach in warning a customer about a serious fraud attempt.

Blue Banner Image Reads: &Quot;Home Working Rules Change Cloud Security Landscape Forever&Quot;
News and Industry Trends

Explore how remote working can define an organisation’s agility and crisis response, all while also considering the potential risks associated with the cloud security landscape.

New Blog Banners 40
News and Industry Trends

Holyrood reports on the UK Government’s £700,000 fund initiative to expand the cyber security sector, signaling huge significant growth and development.

New Blog Banners 39
News and Industry Trends

Microsoft email servers are being targeted by hackers after a series of vulnerabilities were detailed at a computer security conference in August

New Blog Banners 38
News and Industry Trends

Stay informed with the latest strategies tackling cybercrime as governments announce robust plans. Dive into the blog for crucial cybersecurity updates.

New Blog Banners 27
News and Industry Trends

Discover why over half of UK businesses are hiring CISOs to combat cyber threats, with OnSecurity’s updated insights on the evolving role in cybersecurity

New Blog Banners 33
News and Industry Trends

Discover crucial insights on the actively exploited Microsoft zero-day vulnerability. Protect your systems with expert advice and stay ahead of cyber threats.

Password
News and Industry Trends

Explore the risks businesses face with internet-stored data and the prevalent distrust in online security, highlighting the need for robust protection.

Amazon Enquiry 1
News and Industry Trends

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.

The Secrets To Googles Security
News and Industry Trends

Google’s very impressive record: Zero successful phishing attacks on a massive workforce of 140,000+ employees. Discover their security success story.

Amazon Enquiry
News and Industry Trends

Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The

The Secrets To Googles Security
News and Industry Trends

Catch Of The Week Did you know that Google has never been the victim of a successful phishing attack? Not bad for

Malware
News and Industry Trends

Sony is a gigantic multipartite corporation that has been prone to multiple different types of hacks, find out why and how they improve their security posture

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need for continuous testing.

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses. Protect your data with OnSecurity’s penetration testing services.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture, combining human expertise with automation for smarter protection.

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance cost, quality, and security.

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline processes and support your organisation.

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is, how it works, and how penetration testing can help prevent attacks.

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each method for optimal cybersecurity protection.

Banner Image Reads: &Quot;Ethical Hacking Vs. Pentesting: What'S The Difference?&Quot;
Pentesting

Discover the differences between ethical hacking and penetration testing, how they protect your business from cyber threats, and when to choose each for security assessments.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 1 Scaled 1
Pentesting

Explore OnSecurity’s services and products for enhancing your organisation’s security posture. Understand the importance of SOC 2 compliance requirements.

New Blog Banners 16 Scaled 1
Pentesting

Unravel the essentials of ISO 27001 certification in this blog. Explore critical insights and guidelines for a robust security management system.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

List
Pentesting

Join our unique and growing pen-testing company and showcase your talent. We’re seeking skilled pen-testers who stand out from the crowd, apply here now!

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.

Banner Image Reads: &Quot;Who Does Social Engineering Target And Why?&Quot; With Blue Gradient Background.
Vulnerabilities & Hacking

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.

What Is A Zero Day Exploit
Vulnerabilities & Hacking

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

Cyber Attack Malware Virus
Vulnerabilities & Hacking

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post

Who Does Social Engineering Target 1
Vulnerabilities & Hacking

Explore the rise of social engineering threats. Understand how individuals are manipulated to divulge sensitive information, passwords, and financial details.

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Cover 15
Vulnerabilities & Hacking

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.

Cover 8
Vulnerabilities & Hacking

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity

Cover 1
Vulnerabilities & Hacking

Phishing, a cyber-crime that targets victims through email, has become the most common form of online attack. Hackers will attempt

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing attempts to enhance your online security strategy.

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.