Blog

Read our latest news, research & expert advice on cyber security

More from us

Clear all filters
Private Bug Bounty: Finding The Needle In The Haystack
Vulnerabilities and Threats

Private Bug Bounty: Finding The Needle In The Haystack

Daniel Andrew
February 5, 2025
min read
Discover how our security team uncovered complex vulnerabilities that required human expertise to detect - helping our customers stay ahead of emerging threats.
What Is Attack Surface Management?
Attack surface management

What Is Attack Surface Management?

Chris Wallis
December 12, 2024
min read
Learn all about attack surface management, understand why attack surfaces are growing, and discover how to monitor and manage them effectively with Intruder.
Introducing Intel: Your New Favorite Resource For Staying Ahead Of Threats
Vulnerabilities and Threats

Introducing Intel: Your New Favorite Resource For Staying Ahead Of Threats

Chris Wallis
November 14, 2024
min read
When one of our go-to resources, cvetrends.com, shut down last year, it left us with no choice but to build our own. Meet Intel: our free vulnerability intelligence resource.
What's new? Product updates from Intruder October 2024
Product

What's new? Product updates from Intruder October 2024

Andy Hornegold
October 21, 2024
min read
Intruder’s subdomain and related domain discovery, integrations with Cloudflare, Microsoft Sentinel, Okta, and a look ahead at Q4.
What Is Exposure Management And How Does It Differ From ASM?
Attack surface management

What Is Exposure Management And How Does It Differ From ASM?

Andy Hornegold
September 26, 2024
min read
Learn all about exposure management, how it differs from ASM, and how to get started with implementing an exposure management program.
EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?
Attack surface management

EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

Tom Hoskin
September 12, 2024
min read
Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.