OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Cover 13
Vulnerabilities & Hacking

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized

New Blog Banners 51
News and Industry Trends

The continued impact of the pandemic has made working from home the new normal, rapidly

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing

Cover 8
Vulnerabilities & Hacking

Recruitment companies are a prime target for hackers. We go over the main aspects that

Cover 7
News and Industry Trends

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of

Blue Banner Image Reads: &Quot;Cyber Nightmares: What Went Wrong With Travel Ex?&Quot;
News and Industry Trends

Uncovering what went wrong with TravelEx. Investigating ransomware designed to take over the network and

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing

Cover 1
Vulnerabilities & Hacking

Phishing, a cyber-crime that targets victims through email, has become the most common form of

Cover
News and Industry Trends

Launched in 2015, Wishbone is a social networking app that encourages users to have their

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn

Cover 5
News and Industry Trends

What happened in 2014 when Sony became the victim of an attack? Explore how Wiper

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few

New Blog Banners 10
News and Industry Trends

For National Coding Week, we reached out to some of our software developers at OnSecurity to hear their perspective on

Banner Image Reads: &Quot;Hybrid Cloud Security: Why It'S Important For Your Business&Quot;
News and Industry Trends

Learn about the key components of hybrid cloud security and the benefits and challenges of adopting a hybrid cloud environments and setups in business.

New Blog Banners 16 1
News and Industry Trends

Uncover strategies for recognizing impending phishing attacks. This post details our proactive approach in warning a customer about a serious fraud attempt.

Blue Banner Image Reads: &Quot;Home Working Rules Change Cloud Security Landscape Forever&Quot;
News and Industry Trends

Explore how remote working can define an organisation’s agility and crisis response, all while also considering the potential risks associated with the cloud security landscape.

New Blog Banners 40
News and Industry Trends

Holyrood reports on the UK Government’s £700,000 fund initiative to expand the cyber security sector, signaling huge significant growth and development.

New Blog Banners 39
News and Industry Trends

Microsoft email servers are being targeted by hackers after a series of vulnerabilities were detailed at a computer security conference in August

New Blog Banners 38
News and Industry Trends

Stay informed with the latest strategies tackling cybercrime as governments announce robust plans. Dive into the blog for crucial cybersecurity updates.

New Blog Banners 27
News and Industry Trends

Discover why over half of UK businesses are hiring CISOs to combat cyber threats, with OnSecurity’s updated insights on the evolving role in cybersecurity

New Blog Banners 33
News and Industry Trends

Discover crucial insights on the actively exploited Microsoft zero-day vulnerability. Protect your systems with expert advice and stay ahead of cyber threats.

Amazon Enquiry 1
News and Industry Trends

“Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The Financial Times reports.

The Secrets To Googles Security
News and Industry Trends

Google’s very impressive record: Zero successful phishing attacks on a massive workforce of 140,000+ employees. Discover their security success story.

Amazon Enquiry
News and Industry Trends

Online US retail giant Amazon has used its cloud operations to do a deal with the GCHQ, MI5, and MI6, The

The Secrets To Googles Security
News and Industry Trends

Catch Of The Week Did you know that Google has never been the victim of a successful phishing attack? Not bad for

Malware
News and Industry Trends

Sony is a gigantic multipartite corporation that has been prone to multiple different types of hacks, find out why and how they improve their security posture

Password
News and Industry Trends

Explore the risks businesses face with internet-stored data and the prevalent distrust in online security, highlighting the need for robust protection.

Banner Image Reads &Quot;Public Vs Private Cloud Computing: Which Is More Secure?&Quot; With Blue Gradient Background
Pentesting

Explore the pros and cons of public and private cloud computing to determine the best fit for your needs. Learn how to secure any cloud environment with best practices.

Banner Image Reads &Quot;What Does An Internal Infrastructure Pentest Find? Key Insights Explained&Quot; With A Blue Gradient Background.
Pentesting

Discover what an internal infrastructure test reveals about your systems. Gain insights to enhance security and performance. Read the article for more.

Banner Image Reads: &Quot;What Is An Isms? A Clear Guide To Information Security Management Systems&Quot; With Blue Gradient Background And A Question Icon.
News and Industry Trends

Discover what an ISMS is and how it enhances your organisation’s information security. Read our clear guide to implement effective management systems.

Banner Image Reads: &Quot;Difference Between Vulnerability Assessment And Penetration Testing Explained&Quot; With A Blue Gradient Background And Shield Icon.
Pentesting

Discover the key differences between vulnerability assessment and penetration testing, and learn which approach is right for your security needs.

Banner Image Reads &Quot;What Is Iso 27001? A Guide To Information Security&Quot; With A Blue Gradient Background.
Pentesting

Discover what ISO 27001 entails and how it can enhance your information security. Read our comprehensive guide to strengthen your security framework.

Blue Banner Image Reads: &Quot;Llm Prompt Injection: Top Techniques And How To Defend Against Them&Quot; With Cogs In Background.
Pentesting

Learn about LLM prompt injection attacks and exclusive tips and tricks on prompt injection defence in our latest expert blog.

Screenshot 2025 09 30 At 16.53.43
Pentesting

LLM jailbreak guide: examples, attack types, and a practical testing checklist to identify vulnerabilities and boost model safety

Ai Red Teaming
Pentesting

Discover what AI red teaming is, why it’s essential for AI security, and how to start testing your systems for vulnerabilities before attackers do.

Best Open Source Llm Red Teaming Tools
Pentesting

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors & best practices.

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and protect your CI/CD pipeline effectively.

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

Blue Banner Image Reads &Quot;How To Implement Secure Software Development Cycles&Quot;
Vulnerabilities & Hacking

Build a secure software development cycle: integrate pentesting & shift security left. Guide for security leaders & developers.

3
Vulnerabilities & Hacking

Smishing, a form of cyber-attack that uses SMS messages to deceive victims, is on the rise. By exploiting human trust,

Screenshot 2025 08 26 At 14.58.26
Vulnerabilities & Hacking

Exploring Cloud Security: Risks, Regulations & Remedies. Learn from incidents & strategies for robust cloud protection in an evolving digital landscape.

Screenshot 2025 08 26 At 14.55.21
Vulnerabilities & Hacking

Discover how to mitigate financial risks from subdomain takeovers. Learn strategies to safeguard against reputational damage and data breaches.

Screenshot 2025 08 26 At 15.01.07
Vulnerabilities & Hacking

Explore SSDLC stages: From planning to deployment. Learn how to secure web apps effectively with OnSecurity’s solutions.

12
Vulnerabilities & Hacking

How would we define Cybercrime? What do you imagine when you think of a cybercriminal? Do you envision an erratic,

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritizing threats.

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data and systems from unauthorised access and threats.

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this blog.

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers a very comprehensive understanding of the role they play.

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents. Understand the emerging vulnerabilities.

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware tactics that threaten not just data, but a companies reputation

Phishing Biggest Cyber Threat
Vulnerabilities & Hacking

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

Zero Day
Vulnerabilities & Hacking

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.