OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need

Updated Blog Banners 4 5

Discover how OnSecurity’s Pod System revolutionises pentesting with collaborative teams, catching vulnerabilities that traditional methods

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture,

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch

What Is A Brute Force Attack In Cyber Security?
News and Industry Trends

Learn about brute force attacks in cyber security, how they work, types, signs to watch

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is,

Screenshot 2025 07 29 At 14.59.39
News and Industry Trends

Protect your business from phishing scams with these 5 essential tips. Learn how to avoid

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each

New Blog Banners 3 5
News and Industry Trends

From doctor to pentester: Archana Singh’s inspiring journey into cybersecurity shows how passion and resilience

New Blog Banners 3 3
News and Industry Trends

Explore the journeys of women in cybersecurity at OnSecurity, with insights from Product Manager Beth

New Blog Banners 7 Scaled 1
News and Industry Trends

OnSecurity’s CEO emphasises a merit-based hiring approach, career development, and life/work balance. By nurturing talent,

Blue Banner Image Reads &Quot;Top Penetration Testing Challenges For Cisos In 2025&Quot; With A Lanyard Icon To The Right Hand Side.
News and Industry Trends

Explore the top penetration testing challenges CISOs face in 2025 and how AI-powered continuous pentesting is reshaping security assurance.

Screenshot 2025 09 29 At 12.31.12
News and Industry Trends

CEO explains his opinion on how AI is transforming cybersecurity. He explores how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

Banner Image Reads &Quot;Understanding Vibe Codng And Ai-Generated Code In Cybersecurity&Quot;
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

29
News and Industry Trends

Enforceable by January 2025, the EU’s Digital Operational Resilience Act (DORA) introduces a landmark EU regulation framework, designed to help

25
News and Industry Trends

2024 has been a transformative year for the OnSecurity team, marked by progress and significant milestones. To celebrate the company’s

Updated Blog Banners 2
News and Industry Trends

In the blink of an eye, artificial intelligence and emerging technology are shattering the old rules of cybersecurity, rendering traditional

Updated Blog Banners 1
News and Industry Trends

ISO 27001 and SOC 2, Type 2 are two of the most prominent regulatory frameworks in the cybersecurity industry. While

Retail Cybersecurity
News and Industry Trends

Many retailers face rising cyber threats. Discover key challenges and practical solutions to protect systems, data, and customer trust.

Screenshot 2025 08 26 At 15.03.21
News and Industry Trends

Discover what the Digital Operational Resilience Act (DORA) means for cybersecurity in the financial sector. Learn the compliance requirements, and how to prepare with penetration testing.

30
News and Industry Trends

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries, and other public spaces as

16
News and Industry Trends

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He practises archery in his spare

What Is A Penetration Test
Pentesting

What is a penetration test and why should I get one? A penetration test (aka pen-test), is an authorised simulated

Pain
Pentesting

Discover effective strategies to streamline and simplify penetration testing. Learn how to alleviate the complexities for a more efficient testing process.

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.

Banner Image Reads: &Quot;Who Does Social Engineering Target And Why?&Quot; With Blue Gradient Background.
Vulnerabilities & Hacking

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.

What Is A Zero Day Exploit
Vulnerabilities & Hacking

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

Cyber Attack Malware Virus
Vulnerabilities & Hacking

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post

Who Does Social Engineering Target 1
Vulnerabilities & Hacking

Explore the rise of social engineering threats. Understand how individuals are manipulated to divulge sensitive information, passwords, and financial details.

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Cover 15
Vulnerabilities & Hacking

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.

Cover 8
Vulnerabilities & Hacking

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity

Cover 1
Vulnerabilities & Hacking

Phishing, a cyber-crime that targets victims through email, has become the most common form of online attack. Hackers will attempt

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing attempts to enhance your online security strategy.

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.