Blog

Read our latest news, research & expert advice on cyber security.

More from us

Clear all filters
What is the OpenSSH regreSSHion vulnerability (CVE-2024-6387)?
Vulnerabilities and Threats

What is the OpenSSH regreSSHion vulnerability (CVE-2024-6387)?

Benjamin Marr
July 2, 2024
min read
Get the latest on the OpenSSH regreSSHion vulnerability (CVE-2024-6387). Intruder's Security team explain what it is, its potential impact, and what action you need to take.
Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know
Vulnerabilities and Threats

Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know

Benjamin Marr
June 26, 2024
min read
Get the latest on the Progress MOVEit vulnerability (CVE-2024-5806). Intruder's Security Team explain what it is and what action you can take.
CVE-2024-24919: Check Point Security Gateways Vulnerability Explained
Vulnerabilities and Threats

CVE-2024-24919: Check Point Security Gateways Vulnerability Explained

Benjamin Marr
May 30, 2024
min read
Find out all you need to know about the Check Point Security Gateways vulnerability (CVE-2024-24919): what is it, which systems are at risk, and how can Intruder help?
Focus on what matters most: Exposure management and your attack surface
Attack surface management

Focus on what matters most: Exposure management and your attack surface

Andy Hornegold
May 2, 2024
min read
Our VP of Product shares his insights on the importance of exposure management and how it can enable teams to achieve the greatest impact with the least time invested.
What's new? Product updates from Intruder April 2024
Product

What's new? Product updates from Intruder April 2024

Andy Hornegold
May 1, 2024
min read
Intruder’s attack surface management tools, AWS integration improvements, and enhanced web application scanning.
Top 6 Vulnerability Management Tools and Software for 2024
Vulnerability management

Top 6 Vulnerability Management Tools and Software for 2024

Charlie Yianni
April 30, 2024
min read
Discover the top 6 vulnerability management tools to enhance your cybersecurity posture. Explore key features, value-adds & who they're best suited for.
No results found.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Sign up for your free 14-day trial

7 days free trial