OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Blue Gradient Banner Image Reads: Continuous Assurance: How To Build An Ongoing Testing And Monitoring Programme, With A Cog Icon.
Pentesting

Move beyond one-off pentests. Learn how to build a continuous assurance programme with regular testing,

Banner Image Is A Blue Gradient With Title Text Reading: A Guide To Multi Factor / 2 Step Authentication Methods, Depicting A Low Opacity Phone Widget In Background.
News and Industry Trends

Discover how 2-step authentication secures business data from breaches. Compare MFA methods to strengthen your

Banner Image Reads &Quot;What Is A Supply Chain Attack And How Can I Prevent Them?&Quot; With A Blue Gradient Background
Pentesting

Learn how supply chain attacks exploit third-party vulnerabilities and discover essential security measures to safeguard

Banner Image Reads: &Quot;A Guide To External Attack Surface Discovery&Quot;
Pentesting

Discover what hackers can learn about your business online and how external attack surface discovery

Screenshot 2025 12 11 At 10.43.46
Pentesting

Discover the types of penetration testing, including network, web, mobile, cloud, API, and social engineering

Screenshot 2025 12 10 At 14.46.45
Pentesting

Build a strong human firewall with effective security awareness training. Learn how to prevent social

Banner Image Reads &Quot;Public Vs Private Cloud Computing: Which Is More Secure?&Quot; With Blue Gradient Background
Pentesting

Explore the pros and cons of public and private cloud computing to determine the best

Banner Image Reads &Quot;What Does An Internal Infrastructure Pentest Find? Key Insights Explained&Quot; With A Blue Gradient Background.
Pentesting

Discover what an internal infrastructure test reveals about your systems. Gain insights to enhance security

Screenshot 2025 12 10 At 10.29.02

If you’re running self-hosted GitHub Actions runners on AWS EC2, there’s a critical timing vulnerability

Banner Image Reads: &Quot;What Is An Isms? A Clear Guide To Information Security Management Systems&Quot; With Blue Gradient Background And A Question Icon.
News and Industry Trends

Discover what an ISMS is and how it enhances your organisation’s information security. Read our

New Blog Banners 52
News and Industry Trends

Tom Keyte reflects on five years at OnSecurity- from infrastructure wins to security lessons, and

Banner Image Reads: &Quot;Difference Between Vulnerability Assessment And Penetration Testing Explained&Quot; With A Blue Gradient Background And Shield Icon.
Pentesting

Discover the key differences between vulnerability assessment and penetration testing, and learn which approach is

Banner Image Reads: &Quot;How Can I Check My Website Security? Top Tips For Identifying Vulnerabilities&Quot; With A Blue Gradient Background And Website Icon.

Discover essential tools to efficiently assess your website’s vulnerabilities and enhance your website security, with

Banner Image Reads &Quot;What Is Iso 27001? A Guide To Information Security&Quot; With A Blue Gradient Background.
Pentesting

Discover what ISO 27001 entails and how it can enhance your information security. Read our

Screenshot 2025 11 25 At 09.55.06
News and Industry Trends

The EU AI Act sets strict rules for AI providers and users. Learn who it

Banner Image Reads: Secure By Design In Practice: A Guide For Government Product And Delivery Teams&Quot; With A Gradient Blue Background
News and Industry Trends

A practical guide to implementing Secure by Design in UK government product delivery. Covers risk-driven design, lifecycle security activities, compliance with the PSTI Act, and how regular penetration testing keeps your security posture continuously validated.

New Blog Banners 70
News and Industry Trends

Learn GDPR essentials: data protection principles, subject rights, breach management, and compliance tools to safeguard personal data effectively.

Banner Image Reads: &Quot;The Security Of Saas: From Risk To Resilience In Cloud Environments&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn how to secure SaaS applications with expert strategies for data protection, access control, compliance, and threat detection.

Banner Image Reads &Quot;Iso 42001: A Compliance Guide For Businesses&Quot;, With A Blue Gradient Background And Tick Icon.
News and Industry Trends

Learn what ISO 42001 is, why it matters, and how businesses can implement AI governance, manage risk, and align with EU AI Act compliance requirements.

New Blog Banners 62
News and Industry Trends

Protect patient data in healthcare with essential security measures, pentesting insights, and UK data protection guidance.

New Blog Banners 61
News and Industry Trends

Technical debt increases breach risk, slows response, and drives up costs. Learn why security debt matters and how to manage it.

Banner Image Is A Blue Gradient With Title Text Reading: A Guide To Multi Factor / 2 Step Authentication Methods, Depicting A Low Opacity Phone Widget In Background.
News and Industry Trends

Discover how 2-step authentication secures business data from breaches. Compare MFA methods to strengthen your security.

Banner Image Reads: &Quot;What Is An Isms? A Clear Guide To Information Security Management Systems&Quot; With Blue Gradient Background And A Question Icon.
News and Industry Trends

Discover what an ISMS is and how it enhances your organisation’s information security. Read our clear guide to implement effective management systems.

New Blog Banners 52
News and Industry Trends

Tom Keyte reflects on five years at OnSecurity- from infrastructure wins to security lessons, and how his role evolved beyond just writing code.

Screenshot 2025 11 25 At 09.55.06
News and Industry Trends

The EU AI Act sets strict rules for AI providers and users. Learn who it applies to, key risk categories, compliance steps, and what businesses must do to prepare.

Onsecurity Secures Business Of The Year Awards
News and Industry Trends

OnSecurity secures award highlighting the breakthrough year of growth, innovation and AI-augmented cybersecurity

Blue Banner Image Reads: &Quot;Ai Security Risks In 2026: Top Emerging Threats For Businesses&Quot; With A Graphic Of A Human Outline And Brain.
News and Industry Trends

Discover the top emerging AI security risks in 2026, including AI-driven phishing, autonomous agents, model attacks, shadow AI, and governance gaps.

Blue Banner Image Reads &Quot;How Cisos Can Build A Strong Cybersecurity Culture&Quot; With A Graphic Of Extended Hands Meeting In Unison.
News and Industry Trends

Build a proactive cybersecurity culture. Learn how CISOs can drive lasting behavioural change, boost awareness, and reduce cyber risks

Banner Image Reads: &Quot;How To Evaluate A Penetration Test Report: A Remediation Checklist For Security Teams&Quot;
News and Industry Trends

Turn penetration test results into action. Follow this step-by-step remediation checklist to fix vulnerabilities and boost security.

The Banner Image Reads &Quot;Nine Cybersecurity Metrics Boards Actually Care About&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn 9 key cybersecurity metrics boards care about to prove ROI, reduce risk, and align security with business goals.

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need for continuous testing.

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses. Protect your data with OnSecurity’s penetration testing services.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture, combining human expertise with automation for smarter protection.

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance cost, quality, and security.

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline processes and support your organisation.

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is, how it works, and how penetration testing can help prevent attacks.

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each method for optimal cybersecurity protection.

Banner Image Reads: &Quot;Ethical Hacking Vs. Pentesting: What'S The Difference?&Quot;
Pentesting

Discover the differences between ethical hacking and penetration testing, how they protect your business from cyber threats, and when to choose each for security assessments.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 1 Scaled 1
Pentesting

Explore OnSecurity’s services and products for enhancing your organisation’s security posture. Understand the importance of SOC 2 compliance requirements.

New Blog Banners 16 Scaled 1
Pentesting

Unravel the essentials of ISO 27001 certification in this blog. Explore critical insights and guidelines for a robust security management system.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

List
Pentesting

Join our unique and growing pen-testing company and showcase your talent. We’re seeking skilled pen-testers who stand out from the crowd, apply here now!

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.

What Is A Zero Day Exploit
Vulnerabilities & Hacking

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

Cyber Attack Malware Virus
Vulnerabilities & Hacking

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post

Who Does Social Engineering Target 1
Vulnerabilities & Hacking

Explore the rise of social engineering threats. Understand how individuals are manipulated to divulge sensitive information, passwords, and financial details.

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.

Banner Image Reads: &Quot;Who Does Social Engineering Target And Why?&Quot; With Blue Gradient Background.
Vulnerabilities & Hacking

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?

Cover 1
Vulnerabilities & Hacking

Phishing, a cyber-crime that targets victims through email, has become the most common form of online attack. Hackers will attempt

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing attempts to enhance your online security strategy.

New Blog Banners 53
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.

Cover 18
Vulnerabilities & Hacking

Do you suspect a phishing attempt? Explore this guide for actionable steps on what to do next. Get assistance in handling potential phishing incidents.

Cover 13
Vulnerabilities & Hacking

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized access to confidential data and files.

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.