OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

30
News and Industry Trends

With the rise of remote and flexible work policies, many employees have adopted cafes, libraries,

Banner Image Reads: 'Soc 2: Why Is It So Important?&Quot;
Pentesting

Explore OnSecurity’s services and products for enhancing your organization’s security posture. Understand the importance of

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases,

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security,

Banner Image Reads: &Quot;Default Tomcat Host Manager Credentials Lead To Rce&Quot;
Pentesting

Highlighting a critical cybersecurity issue: Unauthorised access is inevitable wherever default credentials are used, underscoring

Sql Union Injection
Pentesting

Discover now how our tester skillfully exploited multiple SQL injection vulnerabilities to extract valuable data

Banner Image Reads: &Quot;Hybrid Cloud Security: Why It'S Important For Your Business&Quot;
News and Industry Trends

Learn about the key components of hybrid cloud security and the benefits and challenges of

Banner Image Reads: &Quot;Understanding Nist Framework: What Is It?&Quot;
Vulnerabilities & Hacking

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats.

Banner Image Reads: &Quot;Understanding Cloud Native Security Systems&Quot; With A Blue Background.
Pentesting

Cloud-native security systems are transforming the way businesses protect their digital assets. Built for the

New Blog Banners 16 1
News and Industry Trends

Uncover strategies for recognizing impending phishing attacks. This post details our proactive approach in warning

Blue Banner Image Reads: Password Reset Bugs: How They Work And The Risks They Pose&Quot; In White Text.
Pentesting

Here Tristan demonstrates how to reset any user’s password by altering the password reset functionality,

Banner Image Reads: &Quot;Error Message And Cloud Access Keys: The Risks Of Exposing Aws Keys&Quot;
Pentesting

Unveiling the risks of exposing cloud acces keys – particularly in reference to AWS (amazon

Banner Image Reads &Quot;Stealing Amazon Ec2 Creds Via Server Side Request Forgery&Quot;
Pentesting

Explore our technique of using Server Side Request Forgery (SSRF) to successfully retrieve EC2 credentials,

New Blog Banners 23
Pentesting

Explore Docker’s security aspects: Understand how taking precautions is crucial to avoid vulnerabilities in this

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

New Blog Banners 3 6
News and Industry Trends

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods, risks, and compliance best practices.

New Blog Banners 3 2
News and Industry Trends

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data. Read more to safeguard your online security today.

New Blog Banners 3
News and Industry Trends

Discover the top 10 fintech app security vulnerabilities found in 2025, plus practical fixes to help your team improve security and reduce cyber risk.

What Is Hashing In Cyber Security?
News and Industry Trends

Learn the essentials of hashing in cyber security, its importance, and practical applications. Discover how it protects data integrity—read more now!

Penetration Testing Best Practices During Financial Mergers And Acquisitions
News and Industry Trends

Ensure secure fintech mergers with penetration testing best practices. Learn how to reduce risk, protect data, and support due diligence during M&A deals.

Cost Of A Retail Data Breach
News and Industry Trends

Discover the true cost of a retail data breach and why regular penetration testing is a smart, ROI-positive investment, not just a compliance requirement.

Most Common Pentest Findings
News and Industry Trends

Understand the most common high-impact penetration testing findings that OnSecurity’s testers discover and the steps to take to remediate them.

Retail Cybersecurity
News and Industry Trends

Many retailers face rising cyber threats. Discover key challenges and practical solutions to protect systems, data, and customer trust.

Updated Blog Banners 4 6
News and Industry Trends

Protect your small business with our 7 essential cybersecurity tips. Learn about employee training, system updates, penetration testing, and MFA to safeguard against cyber threats and financial losses.

Updated Blog Banners 4 4
News and Industry Trends

Discover how AI is transforming enterprise cybersecurity with smarter threat detection, proactive defence, and pentest automation.

Saas Cybersec
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and systems.

Blue Banner Reads: &Quot;Employee Spotlight: The Changing World Of Cyber Sales&Quot;
News and Industry Trends

Duncan Butchart, VP of Sales at OnSecurity, shares insights into his 25-year career journey, the evolution of the cybersecurity industry, and how OnSecurity stands out with its expert team and customer-centric approach.

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses. Protect your data with OnSecurity’s penetration testing services.

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

List
Pentesting

Join our unique and growing pen-testing company and showcase your talent. We’re seeking skilled pen-testers who stand out from the crowd, apply here now!

What Is A Penetration Test 1
Pentesting

You can now explore the purpose and process of penetration tests (pen-tests), authorised simulated cyber-attacks that assess the security of computer systems.

What Is A Penetration Test
Pentesting

What is a penetration test and why should I get one? A penetration test (aka pen-test), is an authorised simulated

Pain
Pentesting

Discover effective strategies to streamline and simplify penetration testing. Learn how to alleviate the complexities for a more efficient testing process.

3
Vulnerabilities & Hacking

Smishing, a form of cyber-attack that uses SMS messages to deceive victims, is on the rise. By exploiting human trust,

Screenshot 2025 08 26 At 15.01.07
Vulnerabilities & Hacking

Explore SSDLC stages: From planning to deployment. Learn how to secure web apps effectively with OnSecurity’s solutions.

Screenshot 2025 08 26 At 14.58.26
Vulnerabilities & Hacking

Exploring Cloud Security: Risks, Regulations & Remedies. Learn from incidents & strategies for robust cloud protection in an evolving digital landscape.

Screenshot 2025 08 26 At 14.55.21
Vulnerabilities & Hacking

Discover how to mitigate financial risks from subdomain takeovers. Learn strategies to safeguard against reputational damage and data breaches.

12
Vulnerabilities & Hacking

How would we define Cybercrime? What do you imagine when you think of a cybercriminal? Do you envision an erratic,

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritizing threats.

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

Banner Image Reads: &Quot;Understanding Nist Framework: What Is It?&Quot;
Vulnerabilities & Hacking

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data and systems from unauthorised access and threats.

Banner Image Reads: &Quot;What Is A Penetration Test And Why Is It So Important?&Quot;
Vulnerabilities & Hacking

Penetration testing is a mostly manual process carried out by experienced consultants, using some of the same methods and tools a real hacker would. You decide on the scope of your test with your consultant, set your target, and your tester will get to work attempting to breach it. This blog will explore the importance of pentesting for businesses, and how to begin.

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware tactics that threaten not just data, but a companies reputation

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this blog.

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers a very comprehensive understanding of the role they play.

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents. Understand the emerging vulnerabilities.

Phishing Biggest Cyber Threat
Vulnerabilities & Hacking

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.