OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in

New Blog Banners 29
Pentesting

This post revolves around general analysis, exploitation and discovery of SQL Injection vulnerabilities in app

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities,

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I

New Blog Banners 3 6
News and Industry Trends

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods,

New Blog Banners 3 2
News and Industry Trends

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data.

New Blog Banners 3
News and Industry Trends

Discover the top 10 fintech app security vulnerabilities found in 2025, plus practical fixes to

What Is Hashing In Cyber Security?
News and Industry Trends

Learn the essentials of hashing in cyber security, its importance, and practical applications. Discover how

Penetration Testing Best Practices During Financial Mergers And Acquisitions
News and Industry Trends

Ensure secure fintech mergers with penetration testing best practices. Learn how to reduce risk, protect

New Blog Banners 30
News and Industry Trends

Defend against BlueKeep’s looming threats. Insights on securing systems from potential widespread attacks and common BlueKeep exploits. This blog will help you stay informed of threats.

Bob And Alice
News and Industry Trends

Preventing complacency in testers is crucial to ensuring you have a successful test. Learn about why an alert and proactive testing approach is essential.

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

New Blog Banners 3 6
News and Industry Trends

Ensure your Open Banking APIs meet regulatory standards with robust security testing. Learn key methods, risks, and compliance best practices.

New Blog Banners 3 2
News and Industry Trends

Discover the risks of using unsecured WiFi and learn effective strategies to protect your data. Read more to safeguard your online security today.

New Blog Banners 3
News and Industry Trends

Discover the top 10 fintech app security vulnerabilities found in 2025, plus practical fixes to help your team improve security and reduce cyber risk.

What Is Hashing In Cyber Security?
News and Industry Trends

Learn the essentials of hashing in cyber security, its importance, and practical applications. Discover how it protects data integrity—read more now!

Penetration Testing Best Practices During Financial Mergers And Acquisitions
News and Industry Trends

Ensure secure fintech mergers with penetration testing best practices. Learn how to reduce risk, protect data, and support due diligence during M&A deals.

Cost Of A Retail Data Breach
News and Industry Trends

Discover the true cost of a retail data breach and why regular penetration testing is a smart, ROI-positive investment, not just a compliance requirement.

Banner Image Reads: Web Application Pentesting Vs Network Pentesting: What'S The Difference?
Pentesting

Discover the key differences between web application pentesting vs network pentesting, when you need each type, and why both are essential for comprehensive security.

Banner Image Reads: Secure By Design In Practice: A Guide For Government Product And Delivery Teams&Quot; With A Gradient Blue Background
News and Industry Trends

A practical guide to implementing Secure by Design in UK government product delivery. Covers risk-driven design, lifecycle security activities, compliance with the PSTI Act, and how regular penetration testing keeps your security posture continuously validated.

Screenshot 2026 02 24 At 14.38.49
Pentesting

OnSecurity’s Pentest Files uncovers the latest vulnerabilities and real-life remediation steps to prevent businesses from malicious attack. In this article we find out how our Head of Pentesting is able to hijack admin invitations to bypass the login wall in our clients infrastructure.

New Blog Banners 70
News and Industry Trends

Learn GDPR essentials: data protection principles, subject rights, breach management, and compliance tools to safeguard personal data effectively.

Banner Image Reads: &Quot;The Security Of Saas: From Risk To Resilience In Cloud Environments&Quot; With A Gradient Blue Background.
News and Industry Trends

Learn how to secure SaaS applications with expert strategies for data protection, access control, compliance, and threat detection.

Banner Image Reads &Quot;Iso 42001: A Compliance Guide For Businesses&Quot;, With A Blue Gradient Background And Tick Icon.
News and Industry Trends

Learn what ISO 42001 is, why it matters, and how businesses can implement AI governance, manage risk, and align with EU AI Act compliance requirements.

Banner Image Reads &Quot;When Should I Cloud Penetration Test?&Quot; With Blue Gradient Background And The Cloud Icon.
Pentesting

Learn how often to conduct cloud penetration testing based on your compliance needs, risk profile and cloud maturity level, from security experts.

New Blog Banners 62
News and Industry Trends

Protect patient data in healthcare with essential security measures, pentesting insights, and UK data protection guidance.

Gradient Blue Banner Image Reads: &Quot;Proactive Security Testing: What Is It, And Why You Need It&Quot;
Pentesting

Discover proactive security testing: prevent breaches before they happen, enhance compliance, and secure AI/LLM systems with continuous validation

Blue Gradient Banner Image Reads: Continuous Assurance: How To Build An Ongoing Testing And Monitoring Programme, With A Cog Icon.
Pentesting

Move beyond one-off pentests. Learn how to build a continuous assurance programme with regular testing, monitoring, and clear metrics that security leaders can track.

Banner Image Is A Blue Gradient With Title Text Reading: A Guide To Multi Factor / 2 Step Authentication Methods, Depicting A Low Opacity Phone Widget In Background.
News and Industry Trends

Discover how 2-step authentication secures business data from breaches. Compare MFA methods to strengthen your security.

Banner Image Reads &Quot;What Is A Supply Chain Attack And How Can I Prevent Them?&Quot; With A Blue Gradient Background
Pentesting

Learn how supply chain attacks exploit third-party vulnerabilities and discover essential security measures to safeguard your business from costly breaches.

Banner Image Reads: &Quot;A Guide To External Attack Surface Discovery&Quot;
Pentesting

Discover what hackers can learn about your business online and how external attack surface discovery helps you reduce risk and strengthen security.

Screenshot 2025 12 11 At 10.43.46
Pentesting

Discover the types of penetration testing, including network, web, mobile, cloud, API, and social engineering tests. Learn how to choose the right pentest.

Screenshot 2025 12 10 At 14.46.45
Pentesting

Build a strong human firewall with effective security awareness training. Learn how to prevent social engineering and strengthen employee defences.

Blue Banner Image Reads &Quot;How To Implement Secure Software Development Cycles&Quot;
Vulnerabilities & Hacking

Build a secure software development cycle: integrate pentesting & shift security left. Guide for security leaders & developers.

3
Vulnerabilities & Hacking

Smishing, a form of cyber-attack that uses SMS messages to deceive victims, is on the rise. By exploiting human trust,

Screenshot 2025 08 26 At 15.01.07
Vulnerabilities & Hacking

Explore SSDLC stages: From planning to deployment. Learn how to secure web apps effectively with OnSecurity’s solutions.

Screenshot 2025 08 26 At 14.58.26
Vulnerabilities & Hacking

Exploring Cloud Security: Risks, Regulations & Remedies. Learn from incidents & strategies for robust cloud protection in an evolving digital landscape.

Screenshot 2025 08 26 At 14.55.21
Vulnerabilities & Hacking

Discover how to mitigate financial risks from subdomain takeovers. Learn strategies to safeguard against reputational damage and data breaches.

12
Vulnerabilities & Hacking

How would we define Cybercrime? What do you imagine when you think of a cybercriminal? Do you envision an erratic,

New Blog Banners 11
Vulnerabilities & Hacking

Radar by OnSecurity: an advanced tool for threat intelligence. Learn its role in enhancing security, achieving ISO certifications, and prioritizing threats.

Banner Image Reads &Quot;Typosquatting And The Impact It Can Have On Your Business&Quot;
Vulnerabilities & Hacking

The risks of typosquatting and its implications for online security. Explore cybercriminal tactics, real-world cases, and protective measures for your brand.

Essential Cybersecurity Checklist 2023
Vulnerabilities & Hacking

The best practices with OnSecurity’s cyber security checklist 2023. Identify crucial steps to protect data and systems from unauthorised access and threats.

Blue Image Banner Reads: &Quot;What Is Triple Extortion Ransomware? Here'S What To Look Out For&Quot;
Vulnerabilities & Hacking

Here we delve into the evolution of ransomware with OnSecurity’s article on Triple Extortion ransomware tactics that threaten not just data, but a companies reputation

Banner Image Reads: &Quot;External Vulnerability Scanning- The Best Practices&Quot;
Vulnerabilities & Hacking

Learn how external vulnerability scanning can support your organisation in achieving operational resilience in this blog.

Blue Banner Image Reads: &Quot;The Best Practices For External Vulnerability Scanning&Quot;
Vulnerabilities & Hacking

Delve into an effective external vulnerability scanning strategy and adopt best practices. This guide offers a very comprehensive understanding of the role they play.

New Blog Banners 31
Vulnerabilities & Hacking

New report reveals increasing cyber threats to drilling rigs, potentially leading to severe safety incidents. Understand the emerging vulnerabilities.

Phishing Biggest Cyber Threat
Vulnerabilities & Hacking

New research shows the prevalence of email phishing as the top cyber threat, tricking firms into revealing information through reputable sender disguises.

Zero Day
Vulnerabilities & Hacking

CVE-2021-44228: A new high profile zero-day vulnerability affecting large number of Java applications through a vulnerable version of the widely-used library Apache log4j.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.