OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

Saas Cybersec
News and Industry Trends

Understanding the importance of cybersecurity for SaaS companies. Explore the awareness of threats and proactive

Blue Banner Reads: &Quot;Employee Spotlight: The Changing World Of Cyber Sales&Quot;
News and Industry Trends

Duncan Butchart, VP of Sales at OnSecurity, shares insights into his 25-year career journey, the

Updated Blog Banners 4
Vulnerabilities & Hacking

Discover how enterprise businesses can tackle remote working cybersecurity risks with pentesting, clear policies, and

Updated Blog Banners 4 3
Vulnerabilities & Hacking

Discover 5 effective ways to protect your business from deepfake scams, including employee training, testing

Updated Blog Banners 4 4
Pentesting

Discover the top 5 CREST-accredited penetration testing service providers in the UK, and find out

Article Pentestfeatured
Pentesting

Penetration tester Leonard Matara shares key insights on pentest pitfalls, security strategy, and the need

Updated Blog Banners 4 5

Discover how OnSecurity’s Pod System revolutionises pentesting with collaborative teams, catching vulnerabilities that traditional methods

What Is Quishing In Cybersecurity?
News and Industry Trends

Learn what quishing is, how it works, and why it’s a major threat to businesses.

New Blog Banners Scaled 1
Pentesting

Discover how AI-powered penetration testing enhances traditional methods, boosts efficiency, and strengthens your security posture,

Updated Blog Banners 4 6
Pentesting

Learn how to save time and money on penetration testing with expert tips to balance

Updated Blog Banners 4 7
Vulnerabilities & Hacking

Learn about brute force attacks in cyber security, how they work, types, signs to watch

What Is A Brute Force Attack In Cyber Security?
News and Industry Trends

Learn about brute force attacks in cyber security, how they work, types, signs to watch

Updated Blog Banners 4 8
Pentesting

Enhance your security posture with essential practices for effective pentest orchestration. Discover strategies that streamline

What Is Ransomware? Causes And Prevention Strategies
News and Industry Trends

Ransomware can cripple businesses by locking critical data and demanding payment. Learn what ransomware is,

Screenshot 2025 07 29 At 14.59.39
News and Industry Trends

Protect your business from phishing scams with these 5 essential tips. Learn how to avoid

Theteam
News and Industry Trends

Look into IT Security through the eyes of a pen-tester. We’ll uncover the inner workings and provide in-depth insights for a comprehensive understanding.

Computer Virus
News and Industry Trends

Unveiling the origins of the first PC virus prank. Dive into the history of pioneering cyber mischief and understand the Elk Cloner Virus in OnSecurity’s blog.

Banner Image Reads: &Quot;Difference Between Vulnerability Assessment And Penetration Testing Explained&Quot; With A Blue Gradient Background And Shield Icon.
Pentesting

Discover the key differences between vulnerability assessment and penetration testing, and learn which approach is right for your security needs.

Banner Image Reads &Quot;What Is Iso 27001? A Guide To Information Security&Quot; With A Blue Gradient Background.
Pentesting

Discover what ISO 27001 entails and how it can enhance your information security. Read our comprehensive guide to strengthen your security framework.

Blue Banner Image Reads: &Quot;Llm Prompt Injection: Top Techniques And How To Defend Against Them&Quot; With Cogs In Background.
Pentesting

Learn about LLM prompt injection attacks and exclusive tips and tricks on prompt injection defence in our latest expert blog.

Screenshot 2025 09 30 At 16.53.43
Pentesting

LLM jailbreak guide: examples, attack types, and a practical testing checklist to identify vulnerabilities and boost model safety

Ai Red Teaming
Pentesting

Discover what AI red teaming is, why it’s essential for AI security, and how to start testing your systems for vulnerabilities before attackers do.

Best Open Source Llm Red Teaming Tools
Pentesting

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors & best practices.

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and protect your CI/CD pipeline effectively.

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Banner Image Reads: &Quot;How Pentesting Can Enhance Telecommunications Defences Against Advanced Persistent Threats&Quot;
News and Industry Trends

Telecommunications providers are prime targets for nation-state actors and advanced persistent threats (APTs) due to their central role in national

Screenshot 2025 09 02 At 14.45.20
News and Industry Trends

Discover how generative AI is transforming cybersecurity for attackers and defenders. Learn the real risks, practical defensive applications, and future trends in AI-powered security.

Pci Dss Compliance
News and Industry Trends

Explore the rise of AI-generated code in vibe coding, its cybersecurity risks, and how to secure fast, intuitive development without sacrificing safety.

10
Pentesting

External penetration testing methodology: what is it and how does it work? External penetration testing is a crucial cybersecurity measure

8
Pentesting

Cybercriminals are no longer targeting just the big players. In fact, small businesses are firmly in their sights too. With

Banner Image Reads: &Quot;What Is Network Penetration Testing?&Quot; With Blue Background.
Pentesting

Cyber threats are evolving, and every business – large or small – faces potential risks. A single vulnerability in your network infrastructure can lead to data breaches, financial losses and reputational damage. Network penetration testing is a proactive approach to uncover and address these vulnerabilities.

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.

Sever Side Template Injection With Jinja2
Vulnerabilities & Hacking

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Careless With Curl Dont Be
Vulnerabilities & Hacking

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity blog on web requests and data transfers. Read now.

What Is Social Engineering 1
Vulnerabilities & Hacking

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in cybersecurity, providing a breakdown of the behavioural techniques that cybercriminals use to manipulate their victims into giving up confidential information or allowing hackers access to secure areas.

List
Vulnerabilities & Hacking

Discover the challenges of managing extensive database audits and our innovative solution using Elasticsearch, a custom Node tool, and PostgreSQL triggers.

Banner Image Reads: &Quot;What Is Spear Phishing And How Does It Differ From Normal Phishing?&Quot; With A Blue Background.
Vulnerabilities & Hacking

Learn the definition of spear phishing and the potential threats it poses to businesses in this article, supported by real-life anecdotes of successful spear phishing attacks on organisations.

Screenshot 2025 08 18 At 16.20.50
Pentesting

Maximise your pentest impact with OnSecurity’s guide on leveraging reports to enhance your security posture and confidently and quickly share results

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.

Screenshot 2025 08 15 At 13.54.36
News and Industry Trends

Learn how iOS penetration testing uncovers vulnerabilities in your mobile apps, ensuring robust security and protecting user data on Apple devices.

Screenshot 2025 08 15 At 14.01.50
News and Industry Trends

What are the differences between ISO 27001 and SOC 2, Type 2? How can I choose the right cybersecurity framework for my organisation?

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.

We create brand value

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.