AI pentesting: the depth of a pentest, on-demand

AI pentesting: the depth of a pentest, on-demand

AI pentesting validates scanner findings in minutes, confirming real risks, ruling out false positives, and uncovering true impact. Now available in Intruder.
Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks — midmarket security teams are stuck in the middle. The Security Middle Child report reveals how bad the gap really is.
How AI is changing the defender’s toolkit

How AI is changing the defender’s toolkit

We explore where AI fits in the defender's toolkit, how it's closing the gap between scanning and pentesting, and what the future of pentesting looks like.
2026 ASM Index: the most common attack surface exposures

2026 ASM Index: the most common attack surface exposures

We analyzed 3,000 attack surfaces to find out how widespread exposure is, what organizations are exposing, and how long it takes to remove it.
Attack surface management vs vulnerability management

Attack surface management vs vulnerability management

Vulnerability management and attack surface management aren't the same thing. Learn the key differences, how they work together, and why you need both.
See TODAY’S CVE TRENDS
Clear all filters
How to secure the Kubernetes API behind a VPN

How to secure the Kubernetes API behind a VPN

Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
Insights
Cyber security: 7 top tips for SMEs

Cyber security: 7 top tips for SMEs

With news headlines focused on security breaches in large organisations, it would be easy for small to medium enterprises (SMEs) to…
Insights
Hacking The Entire Internet Just Got Easier

Hacking The Entire Internet Just Got Easier

The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
Insights
How serious are the Intel / Meltdown / Spectre flaws?

How serious are the Intel / Meltdown / Spectre flaws?

We’re only a few days into 2018, and already we have a cyber-security panic on our hands. Predictions about the year ahead being full of...
Insights
Just how serious is the “ROBOT Attack”?

Just how serious is the “ROBOT Attack”?

The ROBOT attack. Sounds pretty ominous, right? Choosing catchy names for web-based cryptography (TLS) vulnerabilities has become pretty…
Vulnerabilities and Threats
“The Norwegian Government hacked my startup!”

“The Norwegian Government hacked my startup!”

At least, that’s how the conversation started, on a Whatsapp message early on a Friday evening in October, when a concerned startup founder…
Insights
Is Your Web Browser Secretly Mining Bitcoins?

Is Your Web Browser Secretly Mining Bitcoins?

This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
Insights
Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya — How long should it take to patch against a globally recognised exploit, and why are attackers still able to use…
Vulnerabilities and Threats
Team Xball — DDoS Extortion Hoax

Team Xball — DDoS Extortion Hoax

“We are the Team Xball and we have chosen your website/network as target for our next DDoS attack.”
Vulnerabilities and Threats
Apache Struts — Remote Code Execution — CVE-2017–5638

Apache Struts — Remote Code Execution — CVE-2017–5638

On March 7th a critical vulnerability was announced in the Apache Struts framework, a popular web development toolkit that is commonly used…
Vulnerabilities and Threats
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.