Daniel Andrew

Head of Security
Dan heads up the Security team at Intruder. His background is in .NET software engineering, consulting, and penetration testing.

Daniel Andrew

's Posts

Clear all filters
Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)

Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)

Ghost CVEs are vulnerabilities disclosed in GitHub and advisories before hitting NVD. Tracking them lets us patch threats days faster than teams waiting for official databases.
Vulnerabilities and Threats
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Google Cloud Security: What’s Really On Your Shoulders

Google Cloud Security: What’s Really On Your Shoulders

Google Cloud secures its infrastructure, but customers are responsible for the rest. Discover common pitfalls and how to fix them with best practices.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Private Bug Bounty: Finding The Needle In The Haystack

Private Bug Bounty: Finding The Needle In The Haystack

Discover how our security team uncovered complex vulnerabilities that required human expertise to detect - helping our customers stay ahead of emerging threats.
Vulnerabilities and Threats
What is Vulnerability Scanning? + Key Techniques for Scanning

What is Vulnerability Scanning? + Key Techniques for Scanning

Find out everything you need to know to get started with vulnerability scanning and get the most out of your chosen product.
Vulnerability scanning
Introducing Nuclei: the scanner that packs a punch

Introducing Nuclei: the scanner that packs a punch

Find out about Nuclei, the benefits of using multiple scanning engines, and how this helps reduce your attack surface.
Product
How bad is the Citrix Bleed vulnerability [CVE-2023-4966]?

How bad is the Citrix Bleed vulnerability [CVE-2023-4966]?

Get our take on the impact of the NetScaler vulnerability, see if you're affected, and find out how to fix it.
Vulnerabilities and Threats
How much does penetration testing cost in 2026?

How much does penetration testing cost in 2026?

Understand how penetration tests are quoted and find out what to look out for when choosing a vendor.
Penetration testing
5 essential cybersecurity tools for 2026

5 essential cybersecurity tools for 2026

Whether you’re a tech start-up or scaling business, you can easily protect your digital systems and data in just few simple steps with powerful, cost-effective tools.
Vulnerability scanning
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
Penetration testing
What is an external pentest and how is it carried out?

What is an external pentest and how is it carried out?

External penetration testing (also known as external network penetration testing) is a security assessment of an organization's perimeter systems.
Penetration testing
9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

Our research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out ...
Vulnerabilities and Threats
SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?

SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?

A new critical vulnerability in affecting Windows systems came to light on Tuesday, affecting SMB services used by the latest versions of...
Vulnerabilities and Threats
User Enumeration in Microsoft Products: An Incident Waiting to Happen?

User Enumeration in Microsoft Products: An Incident Waiting to Happen?

Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
Vulnerabilities and Threats
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
Vulnerabilities and Threats
Hacking The Entire Internet Just Got Easier

Hacking The Entire Internet Just Got Easier

The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
Insights
Just how serious is the “ROBOT Attack”?

Just how serious is the “ROBOT Attack”?

The ROBOT attack. Sounds pretty ominous, right? Choosing catchy names for web-based cryptography (TLS) vulnerabilities has become pretty…
Vulnerabilities and Threats
Is Your Web Browser Secretly Mining Bitcoins?

Is Your Web Browser Secretly Mining Bitcoins?

This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
Insights
Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya — How long should it take to patch against a globally recognised exploit, and why are attackers still able to use…
Vulnerabilities and Threats
Team Xball — DDoS Extortion Hoax

Team Xball — DDoS Extortion Hoax

“We are the Team Xball and we have chosen your website/network as target for our next DDoS attack.”
Vulnerabilities and Threats
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.