OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Updated Blog Banners 4 5

Discover how OnSecurity’s Pod System revolutionises pentesting with collaborative teams, catching vulnerabilities that traditional methods

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture,

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch

What Is A Brute Force Attack In Cyber Security?
News and Industry Trends

Learn about brute force attacks in cyber security, how they work, types, signs to watch

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is,

Screenshot 2025 07 29 At 14.59.39
News and Industry Trends

Protect your business from phishing scams with these 5 essential tips. Learn how to avoid

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each

New Blog Banners 3 5
News and Industry Trends

From doctor to pentester: Archana Singh’s inspiring journey into cybersecurity shows how passion and resilience

New Blog Banners 3 3
News and Industry Trends

Explore the journeys of women in cybersecurity at OnSecurity, with insights from Product Manager Beth

New Blog Banners 7 Scaled 1
News and Industry Trends

OnSecurity’s CEO emphasises a merit-based hiring approach, career development, and life/work balance. By nurturing talent,

Banner Image Reads: &Quot;Ethical Hacking Vs. Pentesting: What'S The Difference?&Quot;
Pentesting

Discover the differences between ethical hacking and penetration testing, how they protect your business from

16
News and Industry Trends

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He practises archery in his spare

Banner Image Reads: &Quot;Hybrid Cloud Security: Why It'S Important For Your Business&Quot;
News and Industry Trends

Learn about the key components of hybrid cloud security and the benefits and challenges of adopting a hybrid cloud environments and setups in business.

New Blog Banners 16 1
News and Industry Trends

Uncover strategies for recognizing impending phishing attacks. This post details our proactive approach in warning a customer about a serious fraud attempt.

New Blog Banners 33
News and Industry Trends

Discover crucial insights on the actively exploited Microsoft zero-day vulnerability. Protect your systems with expert advice and stay ahead of cyber threats.

Blue Banner Image Reads: &Quot;Home Working Rules Change Cloud Security Landscape Forever&Quot;
News and Industry Trends

Explore how remote working can define an organisation’s agility and crisis response, all while also considering the potential risks associated with the cloud security landscape.

New Blog Banners 40
News and Industry Trends

Holyrood reports on the UK Government’s £700,000 fund initiative to expand the cyber security sector, signaling huge significant growth and development.

New Blog Banners 39
News and Industry Trends

Microsoft email servers are being targeted by hackers after a series of vulnerabilities were detailed at a computer security conference in August

New Blog Banners 38
News and Industry Trends

Stay informed with the latest strategies tackling cybercrime as governments announce robust plans. Dive into the blog for crucial cybersecurity updates.

New Blog Banners 27
News and Industry Trends

Discover why over half of UK businesses are hiring CISOs to combat cyber threats, with OnSecurity’s updated insights on the evolving role in cybersecurity

Malware
News and Industry Trends

Sony is a gigantic multipartite corporation that has been prone to multiple different types of hacks, find out why and how they improve their security posture

Password
News and Industry Trends

Explore the risks businesses face with internet-stored data and the prevalent distrust in online security, highlighting the need for robust protection.

Amazon Enquiry 1
News and Industry Trends

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.

The Secrets To Googles Security
News and Industry Trends

Google’s very impressive record: Zero successful phishing attacks on a massive workforce of 140,000+ employees. Discover their security success story.

Amazon Enquiry
News and Industry Trends

Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The

The Secrets To Googles Security
News and Industry Trends

Catch Of The Week Did you know that Google has never been the victim of a successful phishing attack? Not bad for

Blue Banner Image Reads: &Quot;We Gained Access With A Simple Password Reset. Here'S How.&Quot; In White Text.
Pentesting

A simple bug in the ‘forgotten password’ and password reset mechanism led to a malicious takeover of an entire target application. Find out how this was fixed and secured.

New Blog Banners 23
Pentesting

Explore Docker’s security aspects: Understand how taking precautions is crucial to avoid vulnerabilities in this widely-used containerization platform.

Banner Image Reads &Quot;Stealing Amazon Ec2 Creds Via Server Side Request Forgery&Quot;
Pentesting

Explore our technique of using Server Side Request Forgery (SSRF) to successfully retrieve EC2 credentials, demonstrating advanced cybersecurity tactics.

Banner Image Reads: &Quot;Error Message And Cloud Access Keys: The Risks Of Exposing Aws Keys&Quot;
Pentesting

Unveiling the risks of exposing cloud acces keys – particularly in reference to AWS (amazon web services) keys. This article shares a real example from a recent pen test conducted by our expert testers.

Blue Banner Image Reads: Password Reset Bugs: How They Work And The Risks They Pose&Quot; In White Text.
Pentesting

Here Tristan demonstrates how to reset any user’s password by altering the password reset functionality, revealing a crucial cybersecurity vulnerability responsible for password reset bugs and consequential exploits.

Banner Image Reads: &Quot;Bypassing Freenium With Client-Side Security Controls&Quot;
Pentesting

Discover how one of our pentesters found that client-side security controls hadn’t been enabled in our customer’s target application, allowing them to access features reserved for paying customers, as well as how we fixed it.

Banner Image Reads: &Quot;What Is A Penetration Test And Why Is It So Important?&Quot;
Pentesting

Penetration testing is a mostly manual process carried out by experienced consultants, using some of the same methods and tools a real hacker would. You decide on the scope of your test with your consultant, set your target, and your tester will get to work attempting to breach it. This blog will explore the importance of pentesting for businesses and how to begin.

Cloud Access Keys
Pentesting

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our

Computer Pen Test Guide
Pentesting

Because so much of life is carried out online these days, it’s essential that you take all the necessary steps

Banner Image: Showing The True Roi Of Pentesting
Pentesting

Vulnerability scans look for known vulnerabilities in your systems, while penetration tests systemically exploit weaknesses in the architecture. Which is best for your organisation?

New Feature Online Estimates
Pentesting

Effortlessly obtain a penetration testing quote online without sales calls. Experience a streamlined, hassle-free process for your cybersecurity needs.

Pentesting Postgresql With Sql Injections2 1
Pentesting

Join Gus, explore advanced techniques for detecting and exploiting SQL Injection vulnerabilities in PostgreSQL-based web applications, ensuring robust security.

List 1
Pentesting

Explore the future of pentest reports as we unveil the next-generation approach. Discover what’s on the horizon for cybersecurity assessments and reporting.

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app using the Postgres DMBS. We

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.