OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Updated Blog Banners 4 2
Vulnerabilities & Hacking

Learn what MFA fatigue is, why it poses a security risk, and discover practical steps businesses can take to prevent

Updated Blog Banners 4 1
Vulnerabilities & Hacking

Learn how to build effective cybersecurity policies for your small business. Practical steps to protect data, ensure compliance & reduce

Saas Cybersec
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and

Blue Banner Reads: &Quot;Employee Spotlight: The Changing World Of Cyber Sales&Quot;
News and Industry Trends

Duncan Butchart, VP of Sales at OnSecurity, shares insights into his 25-year career journey, the evolution of the cybersecurity industry,

Updated Blog Banners 4
Vulnerabilities & Hacking

Discover how enterprise businesses can tackle remote working cybersecurity risks with pentesting, clear policies, and training.

Updated Blog Banners 4 3
Vulnerabilities & Hacking

Discover 5 effective ways to protect your business from deepfake scams, including employee training, testing processes, and AI-generated content detection.

Updated Blog Banners 4 4
Pentesting

Discover the top 5 CREST-accredited penetration testing service providers in the UK, and find out what sets them apart. Uncover

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need for continuous testing.

Updated Blog Banners 4 5

Discover how OnSecurity’s Pod System revolutionises pentesting with collaborative teams, catching vulnerabilities that traditional methods miss.

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses. Protect your data with OnSecurity’s

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture, combining human expertise with automation

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance cost, quality, and security.

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch for, and ways to protect

What Is A Brute Force Attack In Cyber Security?
News and Industry Trends

Learn about brute force attacks in cyber security, how they work, types, signs to watch for, and ways to protect

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline processes and support your organisation.

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 1 1 Scaled 1
News and Industry Trends

Discover the purpose of PCI DSS: securing card payments. OnSecurity offers PCI segmentation pentesting for businesses, ensuring a secure payment environment.

New Blog Banners 2 2 Scaled 1
News and Industry Trends

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

A Blue Banner Reading &Quot;Introducing The Threat Intelligence Tool By Onsecurity&Quot;
News and Industry Trends

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritising threats

In The Know: Top Saas Cybersecurity Threats In 2023
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive measures to safeguard data and systems.

Screenshot 2025 08 18 At 15.28.45
News and Industry Trends

Discover how we exploited a SSRF vulnerability in a web application to acquire API credentials and access AWS S3 buckets, showcasing cybersecurity risks.

Banner Image Reads &Quot;Record Breaking Data Breaches Of 2021&Quot; With Blue Branded Background.
News and Industry Trends

Delve into an overview of 2021’s significant data breaches. Explore the most notable incidents and learn from them for better data security practices.

New Feature Instant Booking
News and Industry Trends

Discover OnSecurity’s innovative approach to penetration testing. Our client-collaborative efforts have streamlined booking to just 5 minutes for efficiency.

New Feature Slack Api
News and Industry Trends

Experience real-time communication with your penetration test testers during the testing process for enhanced collaboration and continuous timely updates.

Theteam
News and Industry Trends

Look into IT Security through the eyes of a pen-tester. We’ll uncover the inner workings and provide in-depth insights for a comprehensive understanding.

Computer Virus
News and Industry Trends

Unveiling the origins of the first PC virus prank. Dive into the history of pioneering cyber mischief and understand the Elk Cloner Virus in OnSecurity’s blog.

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors & best practices.

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and protect your CI/CD pipeline effectively.

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

Updated Blog Banners
Pentesting

External and internal penetration testing both exist as part of a broader cybersecurity strategy, supporting organisations in pinpointing vulnerabilities through

33
Pentesting

Firewall penetration testing is a method of locating, scoping, and penetrating a specific firewall to test an organisation’s network infrastructure.

Banner Image That Reads: &Quot;What Is Manual Penetration Testing?&Quot;
Pentesting

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how each can enhance your business’s

Banner Image With Blue Backround That Reads &Quot;How Can Internal Pentesting Strengthen Your Security Posture?&Quot;
Pentesting

Sometimes referred to as ‘internal infrastructure tests’, or ‘internal network tests’, internal penetration tests are the backbone of any thorough

37
Pentesting

Ethical hacking and penetration testing are essential cybersecurity practices that uncover security vulnerabilities by simulating attacks on an organisation’s network.

10
Pentesting

External penetration testing methodology: what is it and how does it work? External penetration testing is a crucial cybersecurity measure

8
Pentesting

Cybercriminals are no longer targeting just the big players. In fact, small businesses are firmly in their sights too. With

Banner Image Reads: &Quot;What Is Network Penetration Testing?&Quot; With Blue Background.
Pentesting

Cyber threats are evolving, and every business – large or small – faces potential risks. A single vulnerability in your network infrastructure can lead to data breaches, financial losses and reputational damage. Network penetration testing is a proactive approach to uncover and address these vulnerabilities.

Banner Image Reads: &Quot;A Guide To Android Penetration Testing&Quot;
Pentesting

Mobile devices are firmly embedded as a huge part of daily life, and therefore making sure Android apps and devices

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

What Is A Zero Day Exploit
Vulnerabilities & Hacking

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.

Cyber Attack Malware Virus
Vulnerabilities & Hacking

Here you can discover the history and impact of MyDoom, the fastest spreading and most damaging computer virus to date, on OnSecurity’s informative blog post

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Cover 13
Vulnerabilities & Hacking

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized access to confidential data and files.

Cover 8
Vulnerabilities & Hacking

Recruitment companies are a prime target for hackers. We go over the main aspects that recruitment companies should be careful of with their CyberSecurity

Cover 15
Vulnerabilities & Hacking

Learn proactive cyber threat prevention through threat modeling. Discover how to anticipate and mitigate security incidents before they occur with this guide.

Cover 1
Vulnerabilities & Hacking

Phishing, a cyber-crime that targets victims through email, has become the most common form of online attack. Hackers will attempt

6 Ways To Spot A Phishing Email 1
Vulnerabilities & Hacking

Safeguard your inbox against cyber threats. Explore our expert insights on spotting and avoiding phishing attempts to enhance your online security strategy.

Cover 4
Vulnerabilities & Hacking

7 effective strategies to improve your company’s security. Discover actionable steps to fortify your defences against cyber threats and safeguard your business.

Cover 9
Vulnerabilities & Hacking

Craig has delved into his research on CVE-2019-11510, uncovering over 736 vulnerable hosts and sharing insights on this critical cybersecurity threat.

Cover 18
Vulnerabilities & Hacking

Do you suspect a phishing attempt? Explore this guide for actionable steps on what to do next. Get assistance in handling potential phishing incidents.

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.