OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need

Updated Blog Banners 4 5

Discover how OnSecurity’s Pod System revolutionises pentesting with collaborative teams, catching vulnerabilities that traditional methods

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture,

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch

What Is A Brute Force Attack In Cyber Security?
News and Industry Trends

Learn about brute force attacks in cyber security, how they work, types, signs to watch

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is,

Screenshot 2025 07 29 At 14.59.39
News and Industry Trends

Protect your business from phishing scams with these 5 essential tips. Learn how to avoid

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each

New Blog Banners 3 5
News and Industry Trends

From doctor to pentester: Archana Singh’s inspiring journey into cybersecurity shows how passion and resilience

New Blog Banners 3 3
News and Industry Trends

Explore the journeys of women in cybersecurity at OnSecurity, with insights from Product Manager Beth

New Blog Banners 7 Scaled 1
News and Industry Trends

OnSecurity’s CEO emphasises a merit-based hiring approach, career development, and life/work balance. By nurturing talent,

I Love You Binary
News and Industry Trends

Delve into the fascinating narrative of how a love letter altered the landscape of computer security perpetually. Uncover this tale of technological evolution.

Ransomware Virus
News and Industry Trends

One of the biggest growing problems in computer security is the growing proliferation of cyberattacks which are far more open and threatening in nature.

Banner Image Reads: &Quot;Cloud Hesitancy To Cyber: Why Do People Question It?&Quot; With Blue Gradient Background.
News and Industry Trends

The myths surrounding cloud security hesitancy. Gain clarity on common misconceptions and make informed decisions about cloud-based security solutions.

Linkedin Phone
News and Industry Trends

Explore the methods targeting LinkedIn users through phishing scams and gain insights into the everyday tactics used by cybercriminals to exploit you further.

Computer Hackers
News and Industry Trends

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and successfully increased the amount of sodium hydroxide.

Cover 11
News and Industry Trends

Dive into the alarming rise of Ryuk ransomware since 2018, which has accumulated over $150 million, showcasing its global financial impact and danger.

File Upload
News and Industry Trends

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.

Project Crobat
News and Industry Trends

Unravel the simplicity of gRPC with Project Crobat. Learn to streamline development with gRPC and empower your projects. Dive into our blog for insights!

Cybercriminal Bitcoin Burglars
News and Industry Trends

Uncover the latest threat looming over government servers. The newfound vulnerability impacts Microsoft systems, leaving government infrastructures at risk.

Tools We Love Clubhouse
News and Industry Trends

We love using Clubhouse to helps us develop our security projects

Cover
News and Industry Trends

Launched in 2015, Wishbone is a social networking app that encourages users to have their say in comparisons of everything

Blue Banner Image Reads: &Quot;Cyber Nightmares: What Went Wrong With Travel Ex?&Quot;
News and Industry Trends

Uncovering what went wrong with TravelEx. Investigating ransomware designed to take over the network and block access to file networks.

Cover 7
News and Industry Trends

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of user data available for malicious actors to share and exploit.

New Blog Banners 51
News and Industry Trends

The continued impact of the pandemic has made working from home the new normal, rapidly accelerating digital transformation in companies

Cover 5
News and Industry Trends

What happened in 2014 when Sony became the victim of an attack? Explore how Wiper malware was deployed and crippled the large corporation’s network.

Banner Image Reads &Quot;Stealing Amazon Ec2 Creds Via Server Side Request Forgery&Quot;
Pentesting

Explore our technique of using Server Side Request Forgery (SSRF) to successfully retrieve EC2 credentials, demonstrating advanced cybersecurity tactics.

Banner Image Reads: &Quot;Error Message And Cloud Access Keys: The Risks Of Exposing Aws Keys&Quot;
Pentesting

Unveiling the risks of exposing cloud acces keys – particularly in reference to AWS (amazon web services) keys. This article shares a real example from a recent pen test conducted by our expert testers.

Blue Banner Image Reads: Password Reset Bugs: How They Work And The Risks They Pose&Quot; In White Text.
Pentesting

Here Tristan demonstrates how to reset any user’s password by altering the password reset functionality, revealing a crucial cybersecurity vulnerability responsible for password reset bugs and consequential exploits.

Banner Image Reads: &Quot;Bypassing Freenium With Client-Side Security Controls&Quot;
Pentesting

Discover how one of our pentesters found that client-side security controls hadn’t been enabled in our customer’s target application, allowing them to access features reserved for paying customers, as well as how we fixed it.

Banner Image Reads: &Quot;What Is A Penetration Test And Why Is It So Important?&Quot;
Pentesting

Penetration testing is a mostly manual process carried out by experienced consultants, using some of the same methods and tools a real hacker would. You decide on the scope of your test with your consultant, set your target, and your tester will get to work attempting to breach it. This blog will explore the importance of pentesting for businesses and how to begin.

Blue Banner Image Reads: &Quot;We Gained Access With A Simple Password Reset. Here'S How.&Quot; In White Text.
Pentesting

A simple bug in the ‘forgotten password’ and password reset mechanism led to a malicious takeover of an entire target application. Find out how this was fixed and secured.

New Blog Banners 23
Pentesting

Explore Docker’s security aspects: Understand how taking precautions is crucial to avoid vulnerabilities in this widely-used containerization platform.

Cloud Access Keys
Pentesting

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our

Computer Pen Test Guide
Pentesting

Because so much of life is carried out online these days, it’s essential that you take all the necessary steps

Banner Image: Showing The True Roi Of Pentesting
Pentesting

Vulnerability scans look for known vulnerabilities in your systems, while penetration tests systemically exploit weaknesses in the architecture. Which is best for your organisation?

Pentesting Postgresql With Sql Injections2 1
Pentesting

Join Gus, explore advanced techniques for detecting and exploiting SQL Injection vulnerabilities in PostgreSQL-based web applications, ensuring robust security.

List 1
Pentesting

Explore the future of pentest reports as we unveil the next-generation approach. Discover what’s on the horizon for cybersecurity assessments and reporting.

New Feature Online Estimates
Pentesting

Effortlessly obtain a penetration testing quote online without sales calls. Experience a streamlined, hassle-free process for your cybersecurity needs.

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app using the Postgres DMBS. We

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

What Is Social Engineering 1
Vulnerabilities & Hacking

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.

Updated Blog Banners 4 5
Vulnerabilities & Hacking

Find out why you need to protect your business against zero-click malware. Discover the best ways to defend your business against attacks.

Updated Blog Banners 4 2
Vulnerabilities & Hacking

Learn what MFA fatigue is, why it poses a security risk, and discover practical steps businesses can take to prevent and mitigate it effectively.

Updated Blog Banners 4 1
Vulnerabilities & Hacking

Learn how to build effective cybersecurity policies for your small business. Practical steps to protect data, ensure compliance & reduce risks.

Updated Blog Banners 4
Vulnerabilities & Hacking

Discover how enterprise businesses can tackle remote working cybersecurity risks with pentesting, clear policies, and training.

Updated Blog Banners 4 3
Vulnerabilities & Hacking

Discover 5 effective ways to protect your business from deepfake scams, including employee training, testing processes, and AI-generated content detection.

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch for, and ways to protect systems from unauthorised access and potential data breaches.

New Blog Banners 15 Scaled 1
Vulnerabilities & Hacking

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.

Banner Image Reading &Quot;Spot A Phishing Email: 6 Key Tips And Tricks&Quot;.
Vulnerabilities & Hacking

Phishing emails are very common. They are spam emails that land in your inbox or junk folder that imitate a real-life, well-known company (or even someone you may know) and ask you to provide them with sensitive information. Be it usernames, passwords or card details, these cybercriminals will aim to get what they need to ‘hack’ you further and can cause many issues including financial loss.

Email Phishing
Vulnerabilities & Hacking

What is Email Phishing a Definition ‘Phishing’ is a cyberattack in which email is the weapon. Victims are tricked into

Screenshot 2025 09 03 At 14.21.18
Vulnerabilities & Hacking

Protect your startup from threat with 7 key security tips. Expert insights to fortify your business against cyber threats and protect your startup’s IT

Back To Basics Make Yourself More Secure
Vulnerabilities & Hacking

Explore these practical cybersecurity steps with OnSecurity’s guide. Make digital safety simple with seven effective measures to protect against hackers

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.