OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data

Blue Banner Image Reads: &Quot;We Gained Access With A Simple Password Reset. Here'S How.&Quot; In White Text.
Pentesting

A simple bug in the ‘forgotten password’ and password reset mechanism led to a malicious

Banner Image Reads: &Quot;What Is A Penetration Test And Why Is It So Important?&Quot;
Pentesting

Penetration testing is a mostly manual process carried out by experienced consultants, using some of

Banner Image Reads: &Quot;Bypassing Freenium With Client-Side Security Controls&Quot;
Pentesting

Discover how one of our pentesters found that client-side security controls hadn’t been enabled in

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers

New Blog Banners 27
News and Industry Trends

Discover why over half of UK businesses are hiring CISOs to combat cyber threats, with

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents.

Blue Banner Image Reads: &Quot;Home Working Rules Change Cloud Security Landscape Forever&Quot;
News and Industry Trends

Explore how remote working can define an organisation’s agility and crisis response, all while also

New Blog Banners 33
News and Industry Trends

Discover crucial insights on the actively exploited Microsoft zero-day vulnerability. Protect your systems with expert

New Blog Banners 38
News and Industry Trends

Stay informed with the latest strategies tackling cybercrime as governments announce robust plans. Dive into

New Blog Banners 39
News and Industry Trends

Microsoft email servers are being targeted by hackers after a series of vulnerabilities were detailed

New Blog Banners 40
News and Industry Trends

Holyrood reports on the UK Government’s £700,000 fund initiative to expand the cyber security sector,

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this

Zero Day
Vulnerabilities & Hacking

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through

New Blog Banners 2 6 Scaled 1
News and Industry Trends

Learn how Mike Oram, VP of engineering at OnSecurity, taught himself coding, and how to navigate coding in the age of AI.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 2 Scaled 1
News and Industry Trends

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

In The Know: Top Saas Cybersecurity Threats In 2023
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and systems.

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

Banner Image Reads &Quot;Record Breaking Data Breaches Of 2021&Quot; With Blue Branded Background.
News and Industry Trends

Delve into an overview of 2021’s significant data breaches. Explore the most notable incidents and learn from them for better data security practices.

New Feature Instant Booking
News and Industry Trends

Discover OnSecurity’s innovative approach to penetration testing. Our client-collaborative efforts have streamlined booking to just 5 minutes for efficiency.

New Feature Slack Api
News and Industry Trends

Experience real-time communication with your penetration test testers during the testing process for enhanced collaboration and continuous timely updates.

Theteam
News and Industry Trends

Look into IT Security through the eyes of a pen-tester. We’ll uncover the inner workings and provide in-depth insights for a comprehensive understanding.

Computer Virus
News and Industry Trends

Unveiling the origins of the first PC virus prank. Dive into the history of pioneering cyber mischief and understand the Elk Cloner Virus in OnSecurity’s blog.

1
Pentesting

Penetration testing is a crucial investment in your organisation’s cybersecurity, but understanding the associated costs can be challenging. While there’s

Updated Blog Banners
Pentesting

External and internal penetration testing both exist as part of a broader cybersecurity strategy, supporting organisations in pinpointing vulnerabilities through

33
Pentesting

Firewall penetration testing is a method of locating, scoping, and penetrating a specific firewall to test an organisation’s network infrastructure.

Banner Image That Reads: &Quot;What Is Manual Penetration Testing?&Quot;
Pentesting

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how each can enhance your business’s

Banner Image With Blue Backround That Reads &Quot;How Can Internal Pentesting Strengthen Your Security Posture?&Quot;
Pentesting

Sometimes referred to as ‘internal infrastructure tests’, or ‘internal network tests’, internal penetration tests are the backbone of any thorough

10
Pentesting

External penetration testing methodology: what is it and how does it work? External penetration testing is a crucial cybersecurity measure

8
Pentesting

Cybercriminals are no longer targeting just the big players. In fact, small businesses are firmly in their sights too. With

Banner Image Reads: &Quot;What Is Network Penetration Testing?&Quot; With Blue Background.
Pentesting

Cyber threats are evolving, and every business – large or small – faces potential risks. A single vulnerability in your network infrastructure can lead to data breaches, financial losses and reputational damage. Network penetration testing is a proactive approach to uncover and address these vulnerabilities.

Banner Image Reads: &Quot;A Guide To Android Penetration Testing&Quot;
Pentesting

Mobile devices are firmly embedded as a huge part of daily life, and therefore making sure Android apps and devices

New Blog Banners 75
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

Banner Image Reads: &Quot;Your Business Needs Regular Penetration Testing. Here'S Why&Quot;. With Blue Background.
Pentesting

What is Penetration Testing? Penetration Testing, otherwise known as “pentesting” or ethical hacking, is the beating heart of all good

Banner Image Reads: 'Soc 2: Why Is It So Important?&Quot;
Pentesting

Explore OnSecurity’s services and products for enhancing your organization’s security posture. Understand the importance of SOC 2 compliance requirements.

Sql Union Injection
Pentesting

Discover now how our tester skillfully exploited multiple SQL injection vulnerabilities to extract valuable data from an application’s backend databases.

Banner Image Reads: &Quot;Understanding Cloud Native Security Systems&Quot; With A Blue Background.
Pentesting

Cloud-native security systems are transforming the way businesses protect their digital assets. Built for the cloud, these systems offer dynamic and scalable solutions to defend against evolving threats. In this blog, we’ll explore what cloud-native security systems are and why they’re essential for modern businesses.

Banner Image Reads: &Quot;Default Tomcat Host Manager Credentials Lead To Rce&Quot;
Pentesting

Highlighting a critical cybersecurity issue: Unauthorised access is inevitable wherever default credentials are used, underscoring the need for caution.

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.

Cover 18
Vulnerabilities & Hacking

Do you suspect a phishing attempt? Explore this guide for actionable steps on what to do next. Get assistance in handling potential phishing incidents.

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights

Sever Side Template Injection With Jinja2
Vulnerabilities & Hacking

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.

What Is Social Engineering 1
Vulnerabilities & Hacking

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.

Careless With Curl Dont Be
Vulnerabilities & Hacking

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity blog on web requests and data transfers. Read now.

List
Vulnerabilities & Hacking

Discover the challenges of managing extensive database audits and our innovative solution using Elasticsearch, a custom Node tool, and PostgreSQL triggers.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in cybersecurity, providing a breakdown of the behavioural techniques that cybercriminals use to manipulate their victims into giving up confidential information or allowing hackers access to secure areas.

Banner Image Reads: &Quot;What Is Spear Phishing And How Does It Differ From Normal Phishing?&Quot; With A Blue Background.
Vulnerabilities & Hacking

Learn the definition of spear phishing and the potential threats it poses to businesses in this article, supported by real-life anecdotes of successful spear phishing attacks on organisations.

Rapid7S Project Sonar2
Vulnerabilities & Hacking

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the journey now within cybersecurity now.

Banner Image Reads: &Quot;What Is Email Phishing? A Foot In The Door For Hackers&Quot;
Vulnerabilities & Hacking

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals

Gain Access To Burp Collaborator Sessions
Vulnerabilities & Hacking

Discover how you use Burpsuite Collaborator persistently for enhanced cybersecurity testing. Now it’s possible to leverage this tool more effectively.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.