OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Best Open Source Llm Red Teaming Tools
Pentesting

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back,

Screenshot 2025 09 29 At 12.31.12
News and Industry Trends

CEO explains his opinion on how AI is transforming cybersecurity. He explores how hackers exploit

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used,

Cloud Security Testing Aws And Azure

Discover cloud security strategies for fintech AWS and Azure deployments in OnSecurity’s latest blog

Banner Image Reads: &Quot;The Importance Of Mobile Application Penetration Testing Services And How To Pick A Vendor&Quot;

Mobile application penetration testing is a critical component of any organisation with a mobile app

New Blog Banners 36

Outdated software and operating systems can leave your business vulnerable to cyberattacks, with potentially devastating

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks,

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to

Banner Image Reads &Quot;Understanding Vibe Codng And Ai-Generated Code In Cybersecurity&Quot;
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to

Banner Image That Reads &Quot;Penetration Testing Into Your Ci/Cd Pipeline.&Quot;

Learn how to integrate penetration testing into CI/CD pipelines seamlessly. Expert tips for balancing speed

3
Vulnerabilities & Hacking

Smishing, a form of cyber-attack that uses SMS messages to deceive victims, is on the

Banner Image Reads: &Quot;A Guide To Android Penetration Testing&Quot;
Pentesting

Mobile devices are firmly embedded as a huge part of daily life, and therefore making

Screenshot 2025 11 25 At 09.55.06
News and Industry Trends

The EU AI Act sets strict rules for AI providers and users. Learn who it applies to, key risk categories, compliance steps, and what businesses must do to prepare.

Onsecurity Secures Business Of The Year Awards
News and Industry Trends

OnSecurity secures award highlighting the breakthrough year of growth, innovation and AI-augmented cybersecurity

Blue Banner Image Reads: &Quot;Ai Security Risks In 2026: Top Emerging Threats For Businesses&Quot; With A Graphic Of A Human Outline And Brain.
News and Industry Trends

Discover the top emerging AI security risks in 2026, including AI-driven phishing, autonomous agents, model attacks, shadow AI, and governance gaps.

Blue Banner Image Reads &Quot;How Cisos Can Build A Strong Cybersecurity Culture&Quot; With A Graphic Of Extended Hands Meeting In Unison.
News and Industry Trends

Build a proactive cybersecurity culture. Learn how CISOs can drive lasting behavioural change, boost awareness, and reduce cyber risks

Banner Image Reads: &Quot;How To Evaluate A Penetration Test Report: A Remediation Checklist For Security Teams&Quot;
News and Industry Trends

Turn penetration test results into action. Follow this step-by-step remediation checklist to fix vulnerabilities and boost security.

The Banner Image Reads &Quot;Nine Cybersecurity Metrics Boards Actually Care About&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn 9 key cybersecurity metrics boards care about to prove ROI, reduce risk, and align security with business goals.

Blue Banner Image Reads &Quot;Top Penetration Testing Challenges For Cisos In 2025&Quot; With A Lanyard Icon To The Right Hand Side.
News and Industry Trends

Explore the top penetration testing challenges CISOs face in 2025 and how AI-powered continuous pentesting is reshaping security assurance.

Screenshot 2025 09 29 At 12.31.12
News and Industry Trends

CEO explains his opinion on how AI is transforming cybersecurity. He explores how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

Banner Image Reads &Quot;Understanding Vibe Codng And Ai-Generated Code In Cybersecurity&Quot;
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

29
News and Industry Trends

Enforceable by January 2025, the EU’s Digital Operational Resilience Act (DORA) introduces a landmark EU regulation framework, designed to help

25
News and Industry Trends

2024 has been a transformative year for the OnSecurity team, marked by progress and significant milestones. To celebrate the company’s

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline processes and support your organisation.

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is, how it works, and how penetration testing can help prevent attacks.

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each method for optimal cybersecurity protection.

Banner Image Reads: &Quot;Ethical Hacking Vs. Pentesting: What'S The Difference?&Quot;
Pentesting

Discover the differences between ethical hacking and penetration testing, how they protect your business from cyber threats, and when to choose each for security assessments.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 1 Scaled 1
Pentesting

Explore OnSecurity’s services and products for enhancing your organisation’s security posture. Understand the importance of SOC 2 compliance requirements.

New Blog Banners 16 Scaled 1
Pentesting

Unravel the essentials of ISO 27001 certification in this blog. Explore critical insights and guidelines for a robust security management system.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

List
Pentesting

Join our unique and growing pen-testing company and showcase your talent. We’re seeking skilled pen-testers who stand out from the crowd, apply here now!

What Is A Penetration Test 1
Pentesting

You can now explore the purpose and process of penetration tests (pen-tests), authorised simulated cyber-attacks that assess the security of computer systems.

What Is A Penetration Test
Pentesting

What is a penetration test and why should I get one? A penetration test (aka pen-test), is an authorised simulated

Pain
Pentesting

Discover effective strategies to streamline and simplify penetration testing. Learn how to alleviate the complexities for a more efficient testing process.

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this blog.

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers a very comprehensive understanding of the role they play.

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents. Understand the emerging vulnerabilities.

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware tactics that threaten not just data, but a companies reputation

Zero Day
Vulnerabilities & Hacking

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.

Phishing Biggest Cyber Threat
Vulnerabilities & Hacking

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

Banner Image Reads: &Quot;Who Does Social Engineering Target And Why?&Quot; With Blue Gradient Background.
Vulnerabilities & Hacking

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

What Is A Zero Day Exploit
Vulnerabilities & Hacking

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.

Cyber Attack Malware Virus
Vulnerabilities & Hacking

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post

Who Does Social Engineering Target 1
Vulnerabilities & Hacking

Explore the rise of social engineering threats. Understand how individuals are manipulated to divulge sensitive information, passwords, and financial details.

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.

We create brand value

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.