OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Banner Image With Blue Backround That Reads &Quot;How Can Internal Pentesting Strengthen Your Security Posture?&Quot;
Pentesting

Sometimes referred to as ‘internal infrastructure tests’, or ‘internal network tests’, internal penetration tests are

Banner Image That Reads: &Quot;What Is Manual Penetration Testing?&Quot;
Pentesting

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how

29
News and Industry Trends

Enforceable by January 2025, the EU’s Digital Operational Resilience Act (DORA) introduces a landmark EU

33
Pentesting

Firewall penetration testing is a method of locating, scoping, and penetrating a specific firewall to

Updated Blog Banners
Pentesting

External and internal penetration testing both exist as part of a broader cybersecurity strategy, supporting

1
Pentesting

Penetration testing is a crucial investment in your organisation’s cybersecurity, but understanding the associated costs

Updated Blog Banners 1
News and Industry Trends

ISO 27001 and SOC 2, Type 2 are two of the most prominent regulatory frameworks

Updated Blog Banners 2
News and Industry Trends

In the blink of an eye, artificial intelligence and emerging technology are shattering the old

New Blog Banners 75
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture

Retail Cybersecurity
News and Industry Trends

Many retailers face rising cyber threats. Discover key challenges and practical solutions to protect systems,

Screenshot 2025 08 26 At 15.03.21
News and Industry Trends

Discover what the Digital Operational Resilience Act (DORA) means for cybersecurity in the financial sector.

Screenshot 2025 08 26 At 14.55.21
Vulnerabilities & Hacking

Discover how to mitigate financial risks from subdomain takeovers. Learn strategies to safeguard against reputational

Screenshot 2025 08 26 At 14.58.26
Vulnerabilities & Hacking

Exploring Cloud Security: Risks, Regulations & Remedies. Learn from incidents & strategies for robust cloud

Screenshot 2025 08 26 At 15.01.07
Vulnerabilities & Hacking

Explore SSDLC stages: From planning to deployment. Learn how to secure web apps effectively with

Banner Image Reads: &Quot;Your Business Needs Regular Penetration Testing. Here'S Why&Quot;. With Blue Background.
Pentesting

What is Penetration Testing? Penetration Testing, otherwise known as “pentesting” or ethical hacking, is the

Ransomware Virus
News and Industry Trends

One of the biggest growing problems in computer security is the growing proliferation of cyberattacks which are far more open and threatening in nature.

Banner Image Reads: &Quot;Cloud Hesitancy To Cyber: Why Do People Question It?&Quot; With Blue Gradient Background.
News and Industry Trends

The myths surrounding cloud security hesitancy. Gain clarity on common misconceptions and make informed decisions about cloud-based security solutions.

Linkedin Phone
News and Industry Trends

Explore the methods targeting LinkedIn users through phishing scams and gain insights into the everyday tactics used by cybercriminals to exploit you further.

Computer Hackers
News and Industry Trends

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and successfully increased the amount of sodium hydroxide.

Cover 11
News and Industry Trends

Dive into the alarming rise of Ryuk ransomware since 2018, which has accumulated over $150 million, showcasing its global financial impact and danger.

File Upload
News and Industry Trends

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.

Project Crobat
News and Industry Trends

Unravel the simplicity of gRPC with Project Crobat. Learn to streamline development with gRPC and empower your projects. Dive into our blog for insights!

I Love You Binary
News and Industry Trends

Delve into the fascinating narrative of how a love letter altered the landscape of computer security perpetually. Uncover this tale of technological evolution.

Cybercriminal Bitcoin Burglars
News and Industry Trends

Uncover the latest threat looming over government servers. The newfound vulnerability impacts Microsoft systems, leaving government infrastructures at risk.

Blue Banner Image Reads: &Quot;Cyber Nightmares: What Went Wrong With Travel Ex?&Quot;
News and Industry Trends

Uncovering what went wrong with TravelEx. Investigating ransomware designed to take over the network and block access to file networks.

Cover 7
News and Industry Trends

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of user data available for malicious actors to share and exploit.

New Blog Banners 51
News and Industry Trends

The continued impact of the pandemic has made working from home the new normal, rapidly accelerating digital transformation in companies

Tools We Love Clubhouse
News and Industry Trends

We love using Clubhouse to helps us develop our security projects

Cover
News and Industry Trends

Launched in 2015, Wishbone is a social networking app that encourages users to have their say in comparisons of everything

Cover 5
News and Industry Trends

What happened in 2014 when Sony became the victim of an attack? Explore how Wiper malware was deployed and crippled the large corporation’s network.

Banner Image Reads &Quot;Public Vs Private Cloud Computing: Which Is More Secure?&Quot; With Blue Gradient Background
Pentesting

Explore the pros and cons of public and private cloud computing to determine the best fit for your needs. Learn how to secure any cloud environment with best practices.

Banner Image Reads &Quot;What Does An Internal Infrastructure Pentest Find? Key Insights Explained&Quot; With A Blue Gradient Background.
Pentesting

Discover what an internal infrastructure test reveals about your systems. Gain insights to enhance security and performance. Read the article for more.

Banner Image Reads: &Quot;What Is An Isms? A Clear Guide To Information Security Management Systems&Quot; With Blue Gradient Background And A Question Icon.
News and Industry Trends

Discover what an ISMS is and how it enhances your organisation’s information security. Read our clear guide to implement effective management systems.

Banner Image Reads: &Quot;Difference Between Vulnerability Assessment And Penetration Testing Explained&Quot; With A Blue Gradient Background And Shield Icon.
Pentesting

Discover the key differences between vulnerability assessment and penetration testing, and learn which approach is right for your security needs.

Banner Image Reads &Quot;What Is Iso 27001? A Guide To Information Security&Quot; With A Blue Gradient Background.
Pentesting

Discover what ISO 27001 entails and how it can enhance your information security. Read our comprehensive guide to strengthen your security framework.

Blue Banner Image Reads: &Quot;Llm Prompt Injection: Top Techniques And How To Defend Against Them&Quot; With Cogs In Background.
Pentesting

Learn about LLM prompt injection attacks and exclusive tips and tricks on prompt injection defence in our latest expert blog.

Screenshot 2025 09 30 At 16.53.43
Pentesting

LLM jailbreak guide: examples, attack types, and a practical testing checklist to identify vulnerabilities and boost model safety

Ai Red Teaming
Pentesting

Discover what AI red teaming is, why it’s essential for AI security, and how to start testing your systems for vulnerabilities before attackers do.

Best Open Source Llm Red Teaming Tools
Pentesting

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors & best practices.

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and protect your CI/CD pipeline effectively.

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

Banner Image Reads: &Quot;What Is Email Phishing? A Foot In The Door For Hackers&Quot;
Vulnerabilities & Hacking

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals

Updated Blog Banners 4 5
Vulnerabilities & Hacking

Find out why you need to protect your business against zero-click malware. Discover the best ways to defend your business against attacks.

Updated Blog Banners 4 2
Vulnerabilities & Hacking

Learn what MFA fatigue is, why it poses a security risk, and discover practical steps businesses can take to prevent and mitigate it effectively.

Updated Blog Banners 4 1
Vulnerabilities & Hacking

Learn how to build effective cybersecurity policies for your small business. Practical steps to protect data, ensure compliance & reduce risks.

Updated Blog Banners 4
Vulnerabilities & Hacking

Discover how enterprise businesses can tackle remote working cybersecurity risks with pentesting, clear policies, and training.

Updated Blog Banners 4 3
Vulnerabilities & Hacking

Discover 5 effective ways to protect your business from deepfake scams, including employee training, testing processes, and AI-generated content detection.

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch for, and ways to protect systems from unauthorised access and potential data breaches.

New Blog Banners 15 Scaled 1
Vulnerabilities & Hacking

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.

Banner Image Reading &Quot;Spot A Phishing Email: 6 Key Tips And Tricks&Quot;.
Vulnerabilities & Hacking

Phishing emails are very common. They are spam emails that land in your inbox or junk folder that imitate a real-life, well-known company (or even someone you may know) and ask you to provide them with sensitive information. Be it usernames, passwords or card details, these cybercriminals will aim to get what they need to ‘hack’ you further and can cause many issues including financial loss.

Email Phishing
Vulnerabilities & Hacking

What is Email Phishing a Definition ‘Phishing’ is a cyberattack in which email is the weapon. Victims are tricked into

Screenshot 2025 09 03 At 14.21.18
Vulnerabilities & Hacking

Protect your startup from threat with 7 key security tips. Expert insights to fortify your business against cyber threats and protect your startup’s IT

Back To Basics Make Yourself More Secure
Vulnerabilities & Hacking

Explore these practical cybersecurity steps with OnSecurity’s guide. Make digital safety simple with seven effective measures to protect against hackers

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.