OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Updated Blog Banners 4 8 Scaled 1
Pentesting

Discover how often different industries may need to complete penetration testing to keep their businesses

Cost Of A Retail Data Breach
News and Industry Trends

Discover the true cost of a retail data breach and why regular penetration testing is

Most Common Pentest Findings
News and Industry Trends

Understand the most common high-impact penetration testing findings that OnSecurity’s testers discover and the steps

Retail Cybersecurity
News and Industry Trends

Many retailers face rising cyber threats. Discover key challenges and practical solutions to protect systems,

Updated Blog Banners 4 6
News and Industry Trends

Protect your small business with our 7 essential cybersecurity tips. Learn about employee training, system

Updated Blog Banners 4 5
Vulnerabilities & Hacking

Find out why you need to protect your business against zero-click malware. Discover the best

Updated Blog Banners 4 4
News and Industry Trends

Discover how AI is transforming enterprise cybersecurity with smarter threat detection, proactive defence, and pentest

Updated Blog Banners 4 2
Vulnerabilities & Hacking

Learn what MFA fatigue is, why it poses a security risk, and discover practical steps

Updated Blog Banners 4 1
Vulnerabilities & Hacking

Learn how to build effective cybersecurity policies for your small business. Practical steps to protect

Saas Cybersec
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive

Blue Banner Reads: &Quot;Employee Spotlight: The Changing World Of Cyber Sales&Quot;
News and Industry Trends

Duncan Butchart, VP of Sales at OnSecurity, shares insights into his 25-year career journey, the

Updated Blog Banners 4
Vulnerabilities & Hacking

Discover how enterprise businesses can tackle remote working cybersecurity risks with pentesting, clear policies, and

Updated Blog Banners 4 3
Vulnerabilities & Hacking

Discover 5 effective ways to protect your business from deepfake scams, including employee training, testing

Updated Blog Banners 4 4
Pentesting

Discover the top 5 CREST-accredited penetration testing service providers in the UK, and find out

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need

New Blog Banners 30
News and Industry Trends

Defend against BlueKeep’s looming threats. Insights on securing systems from potential widespread attacks and common BlueKeep exploits. This blog will help you stay informed of threats.

Bob And Alice
News and Industry Trends

Preventing complacency in testers is crucial to ensuring you have a successful test. Learn about why an alert and proactive testing approach is essential.

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

New Blog Banners 3 6
News and Industry Trends

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods, risks, and compliance best practices.

New Blog Banners 3 2
News and Industry Trends

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data. Read more to safeguard your online security today.

New Blog Banners 3
News and Industry Trends

Discover the top 10 fintech app security vulnerabilities found in 2025, plus practical fixes to help your team improve security and reduce cyber risk.

What Is Hashing In Cyber Security?
News and Industry Trends

Learn the essentials of hashing in cyber security, its importance, and practical applications. Discover how it protects data integrity—read more now!

Penetration Testing Best Practices During Financial Mergers And Acquisitions
News and Industry Trends

Ensure secure fintech mergers with penetration testing best practices. Learn how to reduce risk, protect data, and support due diligence during M&A deals.

Cost Of A Retail Data Breach
News and Industry Trends

Discover the true cost of a retail data breach and why regular penetration testing is a smart, ROI-positive investment, not just a compliance requirement.

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need for continuous testing.

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses. Protect your data with OnSecurity’s penetration testing services.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture, combining human expertise with automation for smarter protection.

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance cost, quality, and security.

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline processes and support your organisation.

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is, how it works, and how penetration testing can help prevent attacks.

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each method for optimal cybersecurity protection.

Banner Image Reads: &Quot;Ethical Hacking Vs. Pentesting: What'S The Difference?&Quot;
Pentesting

Discover the differences between ethical hacking and penetration testing, how they protect your business from cyber threats, and when to choose each for security assessments.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 1 Scaled 1
Pentesting

Explore OnSecurity’s services and products for enhancing your organisation’s security posture. Understand the importance of SOC 2 compliance requirements.

New Blog Banners 16 Scaled 1
Pentesting

Unravel the essentials of ISO 27001 certification in this blog. Explore critical insights and guidelines for a robust security management system.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

List
Pentesting

Join our unique and growing pen-testing company and showcase your talent. We’re seeking skilled pen-testers who stand out from the crowd, apply here now!

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing attempts to enhance your online security strategy.

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights

Abusing Kerberos From Linux
Vulnerabilities & Hacking

Explore Kerberos abuse techniques on Linux with our comprehensive guide. Delve into the available tools and methods for effective Kerberos exploitation.

Sever Side Template Injection With Jinja2
Vulnerabilities & Hacking

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.

What Is Social Engineering 1
Vulnerabilities & Hacking

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.

Careless With Curl Dont Be
Vulnerabilities & Hacking

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity blog on web requests and data transfers. Read now.

List
Vulnerabilities & Hacking

Discover the challenges of managing extensive database audits and our innovative solution using Elasticsearch, a custom Node tool, and PostgreSQL triggers.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in cybersecurity, providing a breakdown of the behavioural techniques that cybercriminals use to manipulate their victims into giving up confidential information or allowing hackers access to secure areas.

Banner Image Reads: &Quot;What Is Spear Phishing And How Does It Differ From Normal Phishing?&Quot; With A Blue Background.
Vulnerabilities & Hacking

Learn the definition of spear phishing and the potential threats it poses to businesses in this article, supported by real-life anecdotes of successful spear phishing attacks on organisations.

Rapid7S Project Sonar2
Vulnerabilities & Hacking

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the journey now within cybersecurity now.

Banner Image Reads: &Quot;What Is Email Phishing? A Foot In The Door For Hackers&Quot;
Vulnerabilities & Hacking

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.