Platform
Vulnerability Management
Scan, prioritize, remediate
AI Security Automation
Act faster
Attack Surface Management
Detect changes and hidden assets
Integrations
Compliance and workflow management
Cloud Security
Daily config checks
Solutions
External Scanning
Infrastructure security
Attack Surface Monitoring
Respond to changes
DAST
Secure web apps
Website Security
140k+ checks
Risk Based Prioritization
No more alert fatigue
API Security
Test your APIs
Asset Discovery
Reveal unknown targets
Emerging Threat Detection
Check and act fast
CSPM
Daily cloud config checks
Compliance
SOC 2, ISO, HIPAA, DORA
Cyber Hygiene Reporting
Demonstrate progress
Internal Scanning
Secure employee devices
Case Studies
Pricing
Resources
Free Tools
cvemon
Vulnerability intel
Autoswagger
Check for API auth flaws
Security
Security Research
Insights from our experts
Cyber Resource Hub
Guides & videos
Cyber Glossary
Learn the lingo
Customers
Help Center
FAQs & tutorials
Developer Hub
APIs & integrations
Trust Center
Security & compliance
Company
About Intruder
History and mission
Press
News and interviews
Partner Program
Become a reseller
Careers
Work with us
Contact
Get in touch
Try free
Log in
Log in
Try for free
Daniel Andrew
Head of Security
Dan heads up the Security team at Intruder. His background is in .NET software engineering, consulting, and penetration testing.
Daniel Andrew
's Posts
Guides
Insights
In the News
Product
Vulnerabilities and Threats
DevOps Security
Cloud security
Application security
Compliance
Attack surface management
Vulnerability management
Vulnerability scanning
Penetration testing
Clear all filters
Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)
Ghost CVEs are vulnerabilities disclosed in GitHub and advisories before hitting NVD. Tracking them lets us patch threats days faster than teams waiting for official databases.
Daniel Andrew
|
min read
February 3, 2026
|
min read
Vulnerabilities and Threats
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)
Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Daniel Andrew
|
min read
January 30, 2026
|
min read
Google Cloud Security: What’s Really On Your Shoulders
Google Cloud secures its infrastructure, but customers are responsible for the rest. Discover common pitfalls and how to fix them with best practices.
Daniel Andrew
|
min read
October 2, 2025
|
min read
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For
Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Daniel Andrew
|
min read
June 17, 2025
|
min read
Cloud security
AWS Cloud Security Explained: What’s Left Exposed?
Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Daniel Andrew
|
min read
March 20, 2025
|
min read
Cloud security
AWS Security Services: What They Do and Don’t Do
AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Daniel Andrew
|
min read
March 6, 2025
|
min read
Cloud security
Private Bug Bounty: Finding The Needle In The Haystack
Discover how our security team uncovered complex vulnerabilities that required human expertise to detect - helping our customers stay ahead of emerging threats.
Daniel Andrew
|
min read
February 5, 2025
|
min read
Vulnerabilities and Threats
What is Vulnerability Scanning? + Key Techniques for Scanning
Find out everything you need to know to get started with vulnerability scanning and get the most out of your chosen product.
Daniel Andrew
|
min read
March 19, 2024
|
min read
Vulnerability scanning
Introducing Nuclei: the scanner that packs a punch
Find out about Nuclei, the benefits of using multiple scanning engines, and how this helps reduce your attack surface.
Daniel Andrew
|
min read
December 14, 2023
|
min read
Product
How bad is the Citrix Bleed vulnerability [CVE-2023-4966]?
Get our take on the impact of the NetScaler vulnerability, see if you're affected, and find out how to fix it.
Daniel Andrew
|
min read
October 25, 2023
|
min read
Vulnerabilities and Threats
How much does penetration testing cost in 2026?
Understand how penetration tests are quoted and find out what to look out for when choosing a vendor.
Daniel Andrew
|
min read
April 11, 2023
|
min read
Penetration testing
5 essential cybersecurity tools for 2026
Whether you’re a tech start-up or scaling business, you can easily protect your digital systems and data in just few simple steps with powerful, cost-effective tools.
Daniel Andrew
|
min read
April 6, 2023
|
min read
Vulnerability scanning
Penetration Testing vs Vulnerability Scanning
What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
Daniel Andrew
|
min read
February 15, 2023
|
min read
Penetration testing
What is an external pentest and how is it carried out?
External penetration testing (also known as external network penetration testing) is a security assessment of an organization's perimeter systems.
Daniel Andrew
|
min read
February 6, 2023
|
min read
Penetration testing
9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot
Our research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out ...
Daniel Andrew
|
min read
July 7, 2020
|
min read
Vulnerabilities and Threats
SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?
A new critical vulnerability in affecting Windows systems came to light on Tuesday, affecting SMB services used by the latest versions of...
Daniel Andrew
|
min read
March 12, 2020
|
min read
Vulnerabilities and Threats
User Enumeration in Microsoft Products: An Incident Waiting to Happen?
Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
Daniel Andrew
|
min read
September 26, 2019
|
min read
Vulnerabilities and Threats
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)
Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
Daniel Andrew
|
min read
May 15, 2019
|
min read
Vulnerabilities and Threats
Hacking The Entire Internet Just Got Easier
The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
Daniel Andrew
|
min read
March 5, 2018
|
min read
Insights
Just how serious is the “ROBOT Attack”?
The ROBOT attack. Sounds pretty ominous, right? Choosing catchy names for web-based cryptography (TLS) vulnerabilities has become pretty…
Daniel Andrew
|
min read
December 18, 2017
|
min read
Vulnerabilities and Threats
Is Your Web Browser Secretly Mining Bitcoins?
This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
Daniel Andrew
|
min read
December 1, 2017
|
min read
Insights
Petya or NotPetya, Why is MS17–010 Still Not Patched?
Petya or NotPetya — How long should it take to patch against a globally recognised exploit, and why are attackers still able to use…
Daniel Andrew
|
min read
June 30, 2017
|
min read
Vulnerabilities and Threats
Team Xball — DDoS Extortion Hoax
“We are the Team Xball and we have chosen your website/network as target for our next DDoS attack.”
Daniel Andrew
|
min read
June 15, 2017
|
min read
Vulnerabilities and Threats
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sign up for your free 14-day trial
Start today