OnSecurity's Latest Articles, News and Industry Tips

Shortwhitedivider

Security should be important to everyone. Our blog features articles regarding your business’ security and different aspects to consider.

What Is A Penetration Test
Pentesting

What is a penetration test and why should I get one? A penetration test (aka

New Feature Slack Api
News and Industry Trends

Experience real-time communication with your penetration test testers during the testing process for enhanced collaboration

New Feature Instant Booking
News and Industry Trends

Discover OnSecurity’s innovative approach to penetration testing. Our client-collaborative efforts have streamlined booking to just

Pain
Pentesting

Discover effective strategies to streamline and simplify penetration testing. Learn how to alleviate the complexities

Theteam
News and Industry Trends

Look into IT Security through the eyes of a pen-tester. We’ll uncover the inner workings

Computer Virus
News and Industry Trends

Unveiling the origins of the first PC virus prank. Dive into the history of pioneering

Computer Hackers
News and Industry Trends

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and successfully increased the amount of sodium hydroxide.

Cybercriminal Bitcoin Burglars
News and Industry Trends

Uncover the latest threat looming over government servers. The newfound vulnerability impacts Microsoft systems, leaving government infrastructures at risk.

Blue Banner Image Reads: &Quot;Cyber Nightmares: What Went Wrong With Travel Ex?&Quot;
News and Industry Trends

Uncovering what went wrong with TravelEx. Investigating ransomware designed to take over the network and block access to file networks.

Cover 7
News and Industry Trends

In this blog we uncover a huge data spill for Wishbone, revealing massive amounts of user data available for malicious actors to share and exploit.

New Blog Banners 51
News and Industry Trends

The continued impact of the pandemic has made working from home the new normal, rapidly accelerating digital transformation in companies

Tools We Love Clubhouse
News and Industry Trends

We love using Clubhouse to helps us develop our security projects

Cover
News and Industry Trends

Launched in 2015, Wishbone is a social networking app that encourages users to have their say in comparisons of everything

Cover 5
News and Industry Trends

What happened in 2014 when Sony became the victim of an attack? Explore how Wiper malware was deployed and crippled the large corporation’s network.

New Blog Banners 30
News and Industry Trends

Defend against BlueKeep’s looming threats. Insights on securing systems from potential widespread attacks and common BlueKeep exploits. This blog will help you stay informed of threats.

Bob And Alice
News and Industry Trends

Preventing complacency in testers is crucial to ensuring you have a successful test. Learn about why an alert and proactive testing approach is essential.

Screenshot 2025 08 18 At 16.07.14
News and Industry Trends

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Screenshot 2025 08 15 At 14.05.27
News and Industry Trends

Understand the Power of Secure Code: Enhance Business Security with Proactive Code Audits. Discover vulnerabilities, ensure compliance, and build trust.

Screenshot 2025 08 15 At 13.51.09
News and Industry Trends

Roles in software engineering are becoming more popular with advances in technology and require a key set of skills. Here we run through how to become a software engineer

Screenshot 2025 08 15 At 13.45.22
News and Industry Trends

Learn about spoofing in cyber security, how it works, common types, and how businesses can detect and protect against this growing cyber threat.

Screenshot 2025 08 15 At 13.48.42
News and Industry Trends

Learn how OnSecurity evolved from the vision of a few founders to an industry-leading pentest provider, as shared by one of its founding members.

Banner Image Reads: &Quot;A Guide To External Attack Surface Discovery&Quot;
Pentesting

Discover what hackers can learn about your business online and how external attack surface discovery helps you reduce risk and strengthen security.

Screenshot 2025 12 11 At 10.43.46
Pentesting

Discover the types of penetration testing, including network, web, mobile, cloud, API, and social engineering tests. Learn how to choose the right pentest.

Screenshot 2025 12 10 At 14.46.45
Pentesting

Build a strong human firewall with effective security awareness training. Learn how to prevent social engineering and strengthen employee defences.

Banner Image Reads &Quot;Public Vs Private Cloud Computing: Which Is More Secure?&Quot; With Blue Gradient Background
Pentesting

Explore the pros and cons of public and private cloud computing to determine the best fit for your needs. Learn how to secure any cloud environment with best practices.

Banner Image Reads &Quot;What Does An Internal Infrastructure Pentest Find? Key Insights Explained&Quot; With A Blue Gradient Background.
Pentesting

Discover what an internal infrastructure test reveals about your systems. Gain insights to enhance security and performance. Read the article for more.

Banner Image Reads: &Quot;What Is An Isms? A Clear Guide To Information Security Management Systems&Quot; With Blue Gradient Background And A Question Icon.
News and Industry Trends

Discover what an ISMS is and how it enhances your organisation’s information security. Read our clear guide to implement effective management systems.

Banner Image Reads: &Quot;Difference Between Vulnerability Assessment And Penetration Testing Explained&Quot; With A Blue Gradient Background And Shield Icon.
Pentesting

Discover the key differences between vulnerability assessment and penetration testing, and learn which approach is right for your security needs.

Banner Image Reads &Quot;What Is Iso 27001? A Guide To Information Security&Quot; With A Blue Gradient Background.
Pentesting

Discover what ISO 27001 entails and how it can enhance your information security. Read our comprehensive guide to strengthen your security framework.

Blue Banner Image Reads: &Quot;Llm Prompt Injection: Top Techniques And How To Defend Against Them&Quot; With Cogs In Background.
Pentesting

Learn about LLM prompt injection attacks and exclusive tips and tricks on prompt injection defence in our latest expert blog.

Screenshot 2025 09 30 At 16.53.43
Pentesting

LLM jailbreak guide: examples, attack types, and a practical testing checklist to identify vulnerabilities and boost model safety

Ai Red Teaming
Pentesting

Discover what AI red teaming is, why it’s essential for AI security, and how to start testing your systems for vulnerabilities before attackers do.

Best Open Source Llm Red Teaming Tools
Pentesting

Discover how AI is transforming cybersecurity. Explore how hackers exploit AI, how defenders fight back, and who holds the upper hand in today’s AI cybersecurity battle

Blue Banner Image Reads &Quot;Llm Red Teaming: A Practical Guide For Ai Security&Quot;
Pentesting

Discover essential LLM red teaming techniques to secure AI systems. Learn step-by-step frameworks, attack vectors & best practices.

New Blog Banners 46
Pentesting

Improve DevOps infrastructure security with post-pentest insights. Learn how to turn findings into action and protect your CI/CD pipeline effectively.

Banner Image Reads &Quot;The Ai Cybersecurity Arms Race - Who Has The Upper Hand?&Quot;
News and Industry Trends

Explore the current cybersecurity AI arms race between hackers and defenders: how it’s being used, who has the edge, and what it means for the future.

Cover 18
Vulnerabilities & Hacking

Do you suspect a phishing attempt? Explore this guide for actionable steps on what to do next. Get assistance in handling potential phishing incidents.

Cve Hunting In An Open Source Application
Vulnerabilities & Hacking

CVE hunting within open-source applications – invaluable insights for identifying vulnerabilities, ensuring robust security in open-source software.

Cover 13
Vulnerabilities & Hacking

Dive deeper into Spear Phishing, a sophisticated cyber attack targeting specific individuals to gain unauthorized access to confidential data and files.

Cover 14
Vulnerabilities & Hacking

Explore the financial implications of data breaches, a frequent occurrence in today’s digital world. Learn about the actual costs behind a data breach.

Cover 2
Vulnerabilities & Hacking

Recently I was tasked to conduct an external infrastructure penetration test against a select few IP addresses of a certain

Banner Image Reads: &Quot;What Is Ransomware And How Do Hackers Choose Targets?&Quot;
Vulnerabilities & Hacking

Uncover the mechanics of ransomware and prevention strategies to safeguard your network against cybercriminal tactics with OnSecurity’s expert insights

Rapid7S Project Sonar2
Vulnerabilities & Hacking

Discover the process and insights behind making Rapid7’s Project Sonar accessible and searchable. Explore the journey now within cybersecurity now.

Banner Image Reads: &Quot;What Is Email Phishing? A Foot In The Door For Hackers&Quot;
Vulnerabilities & Hacking

Get insights into email phishing from an Ethical Hacking Veteran. Learn common tactics with real-world examples and practical tips for businesses & Individuals

Gain Access To Burp Collaborator Sessions
Vulnerabilities & Hacking

Discover how you use Burpsuite Collaborator persistently for enhanced cybersecurity testing. Now it’s possible to leverage this tool more effectively.

Abusing Kerberos From Linux
Vulnerabilities & Hacking

Explore Kerberos abuse techniques on Linux with our comprehensive guide. Delve into the available tools and methods for effective Kerberos exploitation.

Buffer Overflow Easy Chat Server 31
Vulnerabilities & Hacking

Explore the buffer overflow vulnerability in Easy Chat Server 3.1. Gain insights into this security issue and how to successfully these mitigate risks.

Sever Side Template Injection With Jinja2
Vulnerabilities & Hacking

Join Gus on a deep dive into crafting Jinja2 SSTI payloads from scratch. Explore bypass methods and various exploitation techniques in this insightful post.

Careless With Curl Dont Be
Vulnerabilities & Hacking

Gain insight and learn responsible cURL usage and secure scripting practices in this essential OnSecurity blog on web requests and data transfers. Read now.

What Is Social Engineering 1
Vulnerabilities & Hacking

A Penetration Testing Pro shows how social engineering works in the real world. Hackers techniques, real-life examples and practical tips on staying safe.

Blue Banner Image Reads: &Quot;What Is Social Engineering? Definitions, Examples And Tips&Quot;
Vulnerabilities & Hacking

What is social engineering? This blog will define what is meant by ‘social engineering’ in cybersecurity, providing a breakdown of the behavioural techniques that cybercriminals use to manipulate their victims into giving up confidential information or allowing hackers access to secure areas.

Ready to experience the future of pentesting?

Discover how combining expert insight with automation leads to faster, more precise, and high-impact penetration testing.