OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is, how it works, and how

Screenshot 2025 07 29 At 14.59.39
News and Industry Trends

Protect your business from phishing scams with these 5 essential tips. Learn how to avoid phishing attacks and safeguard your

Iso27001 Vs Soc-2, Type 2: An Evaluation
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework

Banner Image Reads: Penetration Testing Vs. Vulnerability Scanning: What'S The Difference?&Quot; With A Blue Branded Background.
News and Industry Trends

Learn the key differences between penetration testing vs. vulnerability scanning. Understand when to use each method for optimal cybersecurity protection.

New Blog Banners 3 5
News and Industry Trends

From doctor to pentester: Archana Singh’s inspiring journey into cybersecurity shows how passion and resilience can shape new careers.

New Blog Banners 3 3
News and Industry Trends

Explore the journeys of women in cybersecurity at OnSecurity, with insights from Product Manager Beth Watts on navigating and thriving

New Blog Banners 7 Scaled 1
News and Industry Trends

OnSecurity’s CEO emphasises a merit-based hiring approach, career development, and life/work balance. By nurturing talent, fostering a supportive workplace, and

Banner Image Reads: &Quot;Ethical Hacking Vs. Pentesting: What'S The Difference?&Quot;
Pentesting

Discover the differences between ethical hacking and penetration testing, how they protect your business from cyber threats, and when to

New Blog Banners 2 6 Scaled 1
News and Industry Trends

Learn how Mike Oram, VP of engineering at OnSecurity, taught himself coding, and how to navigate coding in the age

Title Banner Reads: &Quot;What Is Api Penetration Testing? Everything You Need To Know&Quot;
News and Industry Trends

Explore API pen testing, its benefits, common vulnerabilities, and best practices to strengthen your business’s security posture.

New Blog Banners 2 1 Scaled 1
Pentesting

Explore OnSecurity’s services and products for enhancing your organisation’s security posture. Understand the importance of SOC 2 compliance requirements.

New Blog Banners 1 1 Scaled 1
News and Industry Trends

Discover the purpose of PCI DSS: securing card payments. OnSecurity offers PCI segmentation pentesting for businesses, ensuring a secure payment

New Blog Banners 16 Scaled 1
Pentesting

Unravel the essentials of ISO 27001 certification in this blog. Explore critical insights and guidelines for a robust security management

New Blog Banners 15 Scaled 1
Vulnerabilities & Hacking

Explore the intricacies of this vital framework designed to fortify businesses against diverse cyber threats. Core principles and actionable guidance.

New Blog Banners 2 2 Scaled 1
News and Industry Trends

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your

Bob And Alice
News and Industry Trends

Preventing complacency in testers is crucial to ensuring you have a successful test. Learn about why an alert and proactive testing approach is essential.

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

New Blog Banners 3 6
News and Industry Trends

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods, risks, and compliance best practices.

New Blog Banners 3 2
News and Industry Trends

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data. Read more to safeguard your online security today.

New Blog Banners 3
News and Industry Trends

Discover the top 10 fintech app security vulnerabilities found in 2025, plus practical fixes to help your team improve security and reduce cyber risk.

What Is Hashing In Cyber Security?
News and Industry Trends

Learn the essentials of hashing in cyber security, its importance, and practical applications. Discover how it protects data integrity—read more now!

Penetration Testing Best Practices During Financial Mergers And Acquisitions
News and Industry Trends

Ensure secure fintech mergers with penetration testing best practices. Learn how to reduce risk, protect data, and support due diligence during M&A deals.

Cost Of A Retail Data Breach
News and Industry Trends

Discover the true cost of a retail data breach and why regular penetration testing is a smart, ROI-positive investment, not just a compliance requirement.

Most Common Pentest Findings
News and Industry Trends

Understand the most common high-impact penetration testing findings that OnSecurity’s testers discover and the steps to take to remediate them.

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors & best practices.

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and protect your CI/CD pipeline effectively.

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

33
Pentesting

Firewall penetration testing is a method of locating, scoping, and penetrating a specific firewall to test an organisation’s network infrastructure.

Banner Image That Reads: &Quot;What Is Manual Penetration Testing?&Quot;
Pentesting

The term “penetration testing” or “pentesting” might be familiar, but the different types available—and how each can enhance your business’s

Banner Image With Blue Backround That Reads &Quot;How Can Internal Pentesting Strengthen Your Security Posture?&Quot;
Pentesting

Sometimes referred to as ‘internal infrastructure tests’, or ‘internal network tests’, internal penetration tests are the backbone of any thorough

37
Pentesting

Ethical hacking and penetration testing are essential cybersecurity practices that uncover security vulnerabilities by simulating attacks on an organisation’s network.

10
Pentesting

External penetration testing methodology: what is it and how does it work? External penetration testing is a crucial cybersecurity measure

8
Pentesting

Cybercriminals are no longer targeting just the big players. In fact, small businesses are firmly in their sights too. With

Banner Image Reads: &Quot;What Is Network Penetration Testing?&Quot; With Blue Background.
Pentesting

Cyber threats are evolving, and every business – large or small – faces potential risks. A single vulnerability in your network infrastructure can lead to data breaches, financial losses and reputational damage. Network penetration testing is a proactive approach to uncover and address these vulnerabilities.

Banner Image Reads: &Quot;A Guide To Android Penetration Testing&Quot;
Pentesting

Mobile devices are firmly embedded as a huge part of daily life, and therefore making sure Android apps and devices

1
Pentesting

Penetration testing is a crucial investment in your organisation’s cybersecurity, but understanding the associated costs can be challenging. While there’s

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritizing threats.

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data and systems from unauthorised access and threats.

Banner Image Reads: &Quot;What Is A Penetration Test And Why Is It So Important?&Quot;
Vulnerabilities & Hacking

Penetration testing is a mostly manual process carried out by experienced consultants, using some of the same methods and tools a real hacker would. You decide on the scope of your test with your consultant, set your target, and your tester will get to work attempting to breach it. This blog will explore the importance of pentesting for businesses, and how to begin.

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this blog.

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers a very comprehensive understanding of the role they play.

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents. Understand the emerging vulnerabilities.

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware tactics that threaten not just data, but a companies reputation

Zero Day
Vulnerabilities & Hacking

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.

Phishing Biggest Cyber Threat
Vulnerabilities & Hacking

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

Who Does Social Engineering Target
Vulnerabilities & Hacking

Protecting the data, valuables and account information related to your business has become even more vital as our workplaces have

Macbook
Vulnerabilities & Hacking

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?

Method Confusion
Vulnerabilities & Hacking

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.

Hoth
Vulnerabilities & Hacking

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.

Laptop Hacker Money Padlock
Vulnerabilities & Hacking

Learn 3 essential steps to enhance your cybersecurity posture, and effectively mitigate emerging zero-day vulnerabilities for comprehensive threat protection.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.