OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities,

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I

New Blog Banners 3 6
News and Industry Trends

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods,

New Blog Banners 3 2
News and Industry Trends

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data.

New Blog Banners 3
News and Industry Trends

Discover the top 10 fintech app security vulnerabilities found in 2025, plus practical fixes to

What Is Hashing In Cyber Security?
News and Industry Trends

Learn the essentials of hashing in cyber security, its importance, and practical applications. Discover how

Penetration Testing Best Practices During Financial Mergers And Acquisitions
News and Industry Trends

Ensure secure fintech mergers with penetration testing best practices. Learn how to reduce risk, protect

New Blog Banners 2 6 Scaled 1
News and Industry Trends

Learn how Mike Oram, VP of engineering at OnSecurity, taught himself coding, and how to navigate coding in the age of AI.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 2 Scaled 1
News and Industry Trends

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

In The Know: Top Saas Cybersecurity Threats In 2023
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and systems.

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

Banner Image Reads &Quot;Record Breaking Data Breaches Of 2021&Quot; With Blue Branded Background.
News and Industry Trends

Delve into an overview of 2021’s significant data breaches. Explore the most notable incidents and learn from them for better data security practices.

New Feature Instant Booking
News and Industry Trends

Discover OnSecurity’s innovative approach to penetration testing. Our client-collaborative efforts have streamlined booking to just 5 minutes for efficiency.

New Feature Slack Api
News and Industry Trends

Experience real-time communication with your penetration test testers during the testing process for enhanced collaboration and continuous timely updates.

Theteam
News and Industry Trends

Look into IT Security through the eyes of a pen-tester. We’ll uncover the inner workings and provide in-depth insights for a comprehensive understanding.

Computer Virus
News and Industry Trends

Unveiling the origins of the first PC virus prank. Dive into the history of pioneering cyber mischief and understand the Elk Cloner Virus in OnSecurity’s blog.

1
Pentesting

Penetration testing is a crucial investment in your organisation’s cybersecurity, but understanding the associated costs can be challenging. While there’s

Updated Blog Banners
Pentesting

External and internal penetration testing both exist as part of a broader cybersecurity strategy, supporting organisations in pinpointing vulnerabilities through

33
Pentesting

Firewall penetration testing is a method of locating, scoping, and penetrating a specific firewall to test an organisation’s network infrastructure.

Banner Image That Reads: &Quot;What Is Manual Penetration Testing?&Quot;
Pentesting

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how each can enhance your business’s

Banner Image With Blue Backround That Reads &Quot;How Can Internal Pentesting Strengthen Your Security Posture?&Quot;
Pentesting

Sometimes referred to as ‘internal infrastructure tests’, or ‘internal network tests’, internal penetration tests are the backbone of any thorough

10
Pentesting

External penetration testing methodology: what is it and how does it work? External penetration testing is a crucial cybersecurity measure

8
Pentesting

Cybercriminals are no longer targeting just the big players. In fact, small businesses are firmly in their sights too. With

Banner Image Reads: &Quot;What Is Network Penetration Testing?&Quot; With Blue Background.
Pentesting

Cyber threats are evolving, and every business – large or small – faces potential risks. A single vulnerability in your network infrastructure can lead to data breaches, financial losses and reputational damage. Network penetration testing is a proactive approach to uncover and address these vulnerabilities.

Banner Image Reads: &Quot;A Guide To Android Penetration Testing&Quot;
Pentesting

Mobile devices are firmly embedded as a huge part of daily life, and therefore making sure Android apps and devices

New Blog Banners 75
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

Banner Image Reads: &Quot;Your Business Needs Regular Penetration Testing. Here'S Why&Quot;. With Blue Background.
Pentesting

What is Penetration Testing? Penetration Testing, otherwise known as “pentesting” or ethical hacking, is the beating heart of all good

Banner Image Reads: 'Soc 2: Why Is It So Important?&Quot;
Pentesting

Explore OnSecurity’s services and products for enhancing your organization’s security posture. Understand the importance of SOC 2 compliance requirements.

Sql Union Injection
Pentesting

Discover now how our tester skillfully exploited multiple SQL injection vulnerabilities to extract valuable data from an application’s backend databases.

Banner Image Reads: &Quot;Understanding Cloud Native Security Systems&Quot; With A Blue Background.
Pentesting

Cloud-native security systems are transforming the way businesses protect their digital assets. Built for the cloud, these systems offer dynamic and scalable solutions to defend against evolving threats. In this blog, we’ll explore what cloud-native security systems are and why they’re essential for modern businesses.

Banner Image Reads: &Quot;Default Tomcat Host Manager Credentials Lead To Rce&Quot;
Pentesting

Highlighting a critical cybersecurity issue: Unauthorised access is inevitable wherever default credentials are used, underscoring the need for caution.

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing attempts to enhance your online security strategy.

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights

Abusing Kerberos From Linux
Vulnerabilities & Hacking

Explore Kerberos abuse techniques on Linux with our comprehensive guide. Delve into the available tools and methods for effective Kerberos exploitation.

Sever Side Template Injection With Jinja2
Vulnerabilities & Hacking

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.

What Is Social Engineering 1
Vulnerabilities & Hacking

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.

Careless With Curl Dont Be
Vulnerabilities & Hacking

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity blog on web requests and data transfers. Read now.

List
Vulnerabilities & Hacking

Discover the challenges of managing extensive database audits and our innovative solution using Elasticsearch, a custom Node tool, and PostgreSQL triggers.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in cybersecurity, providing a breakdown of the behavioural techniques that cybercriminals use to manipulate their victims into giving up confidential information or allowing hackers access to secure areas.

Banner Image Reads: &Quot;What Is Spear Phishing And How Does It Differ From Normal Phishing?&Quot; With A Blue Background.
Vulnerabilities & Hacking

Learn the definition of spear phishing and the potential threats it poses to businesses in this article, supported by real-life anecdotes of successful spear phishing attacks on organisations.

Rapid7S Project Sonar2
Vulnerabilities & Hacking

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the journey now within cybersecurity now.

Banner Image Reads: &Quot;What Is Email Phishing? A Foot In The Door For Hackers&Quot;
Vulnerabilities & Hacking

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.