OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Banner Image Reads: &Quot;Difference Between Vulnerability Assessment And Penetration Testing Explained&Quot; With A Blue Gradient Background And Shield Icon.
Pentesting

Discover the key differences between vulnerability assessment and penetration testing, and learn which approach is

Banner Image Reads: &Quot;How Can I Check My Website Security? Top Tips For Identifying Vulnerabilities&Quot; With A Blue Gradient Background And Website Icon.

Discover essential tools to efficiently assess your website’s vulnerabilities and enhance your website security, with

Banner Image Reads &Quot;What Is Iso 27001? A Guide To Information Security&Quot; With A Blue Gradient Background.
Pentesting

Discover what ISO 27001 entails and how it can enhance your information security. Read our

Screenshot 2025 11 25 At 09.55.06
News and Industry Trends

The EU AI Act sets strict rules for AI providers and users. Learn who it

Onsecurity Secures Business Of The Year Awards
News and Industry Trends

OnSecurity secures award highlighting the breakthrough year of growth, innovation and AI-augmented cybersecurity

Blue Banner Image Reads: &Quot;Ai Security Risks In 2026: Top Emerging Threats For Businesses&Quot; With A Graphic Of A Human Outline And Brain.
News and Industry Trends

Discover the top emerging AI security risks in 2026, including AI-driven phishing, autonomous agents, model

Blue Banner Image Reads &Quot;How Cisos Can Build A Strong Cybersecurity Culture&Quot; With A Graphic Of Extended Hands Meeting In Unison.
News and Industry Trends

Build a proactive cybersecurity culture. Learn how CISOs can drive lasting behavioural change, boost awareness,

New Blog Banners 61

Matt Moses leads OnSecurity’s Movember efforts, raising funds and awareness for men’s health through running

Banner Image Reads: &Quot;How To Evaluate A Penetration Test Report: A Remediation Checklist For Security Teams&Quot;
News and Industry Trends

Turn penetration test results into action. Follow this step-by-step remediation checklist to fix vulnerabilities and

The Banner Image Reads &Quot;Nine Cybersecurity Metrics Boards Actually Care About&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn 9 key cybersecurity metrics boards care about to prove ROI, reduce risk, and align

Banner Image Reads: &Quot;How Can Phishing Simulation Services Protect My Business From Cyber Attacks?&Quot; With Blue Gradient Background.

Discover proven strategies to recognise and prevent phishing attacks, strengthen employee defences, and protect your

Blue Banner Image Reads &Quot;Top Penetration Testing Challenges For Cisos In 2025&Quot; With A Lanyard Icon To The Right Hand Side.
News and Industry Trends

Explore the top penetration testing challenges CISOs face in 2025 and how AI-powered continuous pentesting

Blue Banner Image Reads: &Quot;Llm Prompt Injection: Top Techniques And How To Defend Against Them&Quot; With Cogs In Background.
Pentesting

Learn about LLM prompt injection attacks and exclusive tips and tricks on prompt injection defence

Screenshot 2025 09 30 At 16.53.43
Pentesting

LLM jailbreak guide: examples, attack types, and a practical testing checklist to identify vulnerabilities and

Ai Red Teaming
Pentesting

Discover what AI red teaming is, why it’s essential for AI security, and how to

Screenshot 2025 07 29 At 14.59.39
News and Industry Trends

Protect your business from phishing scams with these 5 essential tips. Learn how to avoid phishing attacks and safeguard your data from cybercriminals.

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each method for optimal cybersecurity protection.

New Blog Banners 3 5
News and Industry Trends

From doctor to pentester: Archana Singh’s inspiring journey into cybersecurity shows how passion and resilience can shape new careers.

New Blog Banners 3 3
News and Industry Trends

Explore the journeys of women in cybersecurity at OnSecurity, with insights from Product Manager Beth Watts on navigating and thriving in tech.

New Blog Banners 7 Scaled 1
News and Industry Trends

OnSecurity’s CEO emphasises a merit-based hiring approach, career development, and life/work balance. By nurturing talent, fostering a supportive workplace, and offering flexibility, OnSecurity has boosted productivity and employee satisfaction.

New Blog Banners 2 6 Scaled 1
News and Industry Trends

Learn how Mike Oram, VP of engineering at OnSecurity, taught himself coding, and how to navigate coding in the age of AI.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 2 Scaled 1
News and Industry Trends

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

In The Know: Top Saas Cybersecurity Threats In 2023
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and systems.

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

Banner Image Reads &Quot;Record Breaking Data Breaches Of 2021&Quot; With Blue Branded Background.
News and Industry Trends

Delve into an overview of 2021’s significant data breaches. Explore the most notable incidents and learn from them for better data security practices.

New Feature Instant Booking
News and Industry Trends

Discover OnSecurity’s innovative approach to penetration testing. Our client-collaborative efforts have streamlined booking to just 5 minutes for efficiency.

New Feature Slack Api
News and Industry Trends

Experience real-time communication with your penetration test testers during the testing process for enhanced collaboration and continuous timely updates.

Banner Image Reads &Quot;Stealing Amazon Ec2 Creds Via Server Side Request Forgery&Quot;
Pentesting

Explore our technique of using Server Side Request Forgery (SSRF) to successfully retrieve EC2 credentials, demonstrating advanced cybersecurity tactics.

Banner Image Reads: &Quot;Error Message And Cloud Access Keys: The Risks Of Exposing Aws Keys&Quot;
Pentesting

Unveiling the risks of exposing cloud acces keys – particularly in reference to AWS (amazon web services) keys. This article shares a real example from a recent pen test conducted by our expert testers.

Blue Banner Image Reads: Password Reset Bugs: How They Work And The Risks They Pose&Quot; In White Text.
Pentesting

Here Tristan demonstrates how to reset any user’s password by altering the password reset functionality, revealing a crucial cybersecurity vulnerability responsible for password reset bugs and consequential exploits.

Cloud Access Keys
Pentesting

Welcome to our Pentest Files blog series. Each blog post will present an interesting or dangerous finding one of our

Computer Pen Test Guide
Pentesting

Because so much of life is carried out online these days, it’s essential that you take all the necessary steps

Banner Image: Showing The True Roi Of Pentesting
Pentesting

Vulnerability scans look for known vulnerabilities in your systems, while penetration tests systemically exploit weaknesses in the architecture. Which is best for your organisation?

List 1
Pentesting

Explore the future of pentest reports as we unveil the next-generation approach. Discover what’s on the horizon for cybersecurity assessments and reporting.

New Feature Online Estimates
Pentesting

Effortlessly obtain a penetration testing quote online without sales calls. Experience a streamlined, hassle-free process for your cybersecurity needs.

Pentesting Postgresql With Sql Injections2 1
Pentesting

Join Gus, explore advanced techniques for detecting and exploiting SQL Injection vulnerabilities in PostgreSQL-based web applications, ensuring robust security.

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app using the Postgres DMBS. We

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.

Cover 18
Vulnerabilities & Hacking

Do you suspect a phishing attempt? Explore this guide for actionable steps on what to do next. Get assistance in handling potential phishing incidents.

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Cover 13
Vulnerabilities & Hacking

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized access to confidential data and files.

Cover 8
Vulnerabilities & Hacking

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity

Cover 15
Vulnerabilities & Hacking

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.

Cover 1
Vulnerabilities & Hacking

Phishing, a cyber-crime that targets victims through email, has become the most common form of online attack. Hackers will attempt

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain

Banner Image Reads: &Quot;What Is Email Phishing? A Foot In The Door For Hackers&Quot;
Vulnerabilities & Hacking

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals

Gain Access To Burp Collaborator Sessions
Vulnerabilities & Hacking

Discover how you use Burpsuite Collaborator persistently for enhanced cybersecurity testing. Now it’s possible to leverage this tool more effectively.

Abusing Kerberos From Linux
Vulnerabilities & Hacking

Explore Kerberos abuse techniques on Linux with our comprehensive guide. Delve into the available tools and methods for effective Kerberos exploitation.

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.

We create brand value

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.