OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Who Does Social Engineering Target 1
Vulnerabilities & Hacking

Explore the rise of social engineering threats. Understand how individuals are manipulated to divulge sensitive information, passwords, and financial details.

Ransomware Virus
News and Industry Trends

One of the biggest growing problems in computer security is the growing proliferation of cyberattacks which are far more open

Cyber Attack Malware Virus
Vulnerabilities & Hacking

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date,

What Is A Zero Day
Vulnerabilities & Hacking

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security

Cover 11
News and Industry Trends

Dive into the alarming rise of Ryuk ransomware since 2018, which has accumulated over $150 million, showcasing its global financial

Linkedin Phone
News and Industry Trends

Explore the methods targeting LinkedIn users through phishing scams and gain insights into the everyday tactics used by cybercriminals to

I Love You Binary
News and Industry Trends

Delve into the fascinating narrative of how a love letter altered the landscape of computer security perpetually. Uncover this tale

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more

Project Crobat
News and Industry Trends

Unravel the simplicity of gRPC with Project Crobat. Learn to streamline development with gRPC and empower your projects. Dive into

File Upload
News and Industry Trends

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry

Computer Hackers
News and Industry Trends

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and

Cloud Security Testing
News and Industry Trends

The myths surrounding cloud security hesitancy. Gain clarity on common misconceptions and make informed decisions about cloud-based security solutions.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

Screenshot 2025 09 29 At 12.31.12
News and Industry Trends

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

Banner Image Reads &Quot;Understanding Vibe Codng And Ai-Generated Code In Cybersecurity&Quot;
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

29
News and Industry Trends

Enforceable by January 2025, the EU’s Digital Operational Resilience Act (DORA) introduces a landmark EU regulation framework, designed to help

25
News and Industry Trends

2024 has been a transformative year for the OnSecurity team, marked by progress and significant milestones. To celebrate the company’s

Updated Blog Banners 2
News and Industry Trends

In the blink of an eye, artificial intelligence and emerging technology are shattering the old rules of cybersecurity, rendering traditional

Updated Blog Banners 1
News and Industry Trends

ISO 27001 and SOC 2, Type 2 are two of the most prominent regulatory frameworks in the cybersecurity industry. While

Retail Cybersecurity
News and Industry Trends

Many retailers face rising cyber threats. Discover key challenges and practical solutions to protect systems, data, and customer trust.

Screenshot 2025 08 26 At 15.03.21
News and Industry Trends

Discover what the Digital Operational Resilience Act (DORA) means for cybersecurity in the financial sector. Learn the compliance requirements, and how to prepare with penetration testing.

30
News and Industry Trends

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries, and other public spaces as

16
News and Industry Trends

Conor O’Neill is not your typical CEO. In 2023 he completed an Ironman marathon. He practises archery in his spare

New Blog Banners 10
News and Industry Trends

For National Coding Week, we reached out to some of our software developers at OnSecurity to hear their perspective on

Computer Pen Test Guide
Pentesting

Because so much of life is carried out online these days, it’s essential that you take all the necessary steps

Cover 16
Pentesting

Vulnerability scans look for known vulnerabilities in your systems, while Penetration tests intend to exploit weaknesses in the architecture. How To Do….

Cover 3
Pentesting

The critical differences between a penetration test and a vulnerability scan are often misunderstood. While both processes work to protect

New Feature Online Estimates
Pentesting

Effortlessly obtain a penetration testing quote online without sales calls. Experience a streamlined, hassle-free process for your cybersecurity needs.

Pentesting Postgresql With Sql Injections2 1
Pentesting

Join Gus, explore advanced techniques for detecting and exploiting SQL Injection vulnerabilities in PostgreSQL-based web applications, ensuring robust security.

List 1
Pentesting

Explore the future of pentest reports as we unveil the next-generation approach. Discover what’s on the horizon for cybersecurity assessments and reporting.

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app using the Postgres DMBS. We

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritizing threats.

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data and systems from unauthorised access and threats.

Banner Image Reads: &Quot;What Is A Penetration Test And Why Is It So Important?&Quot;
Vulnerabilities & Hacking

Penetration testing is a mostly manual process carried out by experienced consultants, using some of the same methods and tools a real hacker would. You decide on the scope of your test with your consultant, set your target, and your tester will get to work attempting to breach it. This blog will explore the importance of pentesting for businesses, and how to begin.

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this blog.

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers a very comprehensive understanding of the role they play.

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents. Understand the emerging vulnerabilities.

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware tactics that threaten not just data, but a companies reputation

Zero Day
Vulnerabilities & Hacking

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.

Phishing Biggest Cyber Threat
Vulnerabilities & Hacking

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

Who Does Social Engineering Target
Vulnerabilities & Hacking

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.