Blog Read our latest news, research & expert advice on cyber security
Sign up for the Intruder Newsletter Reality check: How will generative AI really impact cyber security? Chris Wallis explores how the technology could be deployed in security contexts.
read more Sign up for the Intruder Monthly Newsletter 28 cyber security stats and facts you need to know in 2023 Discover the scale of today's cyber security challenges and how to stay ahead with our top tips.
read more September 27, 2022
James Harrison
Top API security tools Knowing where your APIs are, and understanding how to protect them, is more important than ever.
read more September 27, 2022
James Harrison
5 essential cybersecurity tools for tech businesses Whether you’re a tech start-up or scaling business, you can easily protect your digital systems and data in just few simple steps with powerful, cost-effective tools.
read more January 17, 2020
Daniel Andrew
Introducing fully informed API scanning Eliminate risks to vulnerable APIs in development, perform rapid scans to accelerate innovation, and get actionable remediation advice to secure your APIs.
read more September 27, 2022
James Harrison
All you need to know about API security APIs are everywhere and agile innovation isn't possible unless they're secure.
read more September 27, 2022
James Harrison
Vulnerability scanner for Windows 76% of desktops and 20% of servers run on Windows, so scanning for vulnerabilities of this huge attack surface is critical for most businesses today.
read more September 27, 2022
James Harrison
Product Update: Continuous Network Scanning We’re excited to announce more enhancements to our continuous network scanning with new features to Network View, continuous scanning and an even better UX.
read more September 16, 2021
Andy Hornegold
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708) Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
read more January 17, 2020
Daniel Andrew
How to secure the Kubernetes API behind a VPN Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
read more January 17, 2020
Lefteris Nikoltsios
Reality check: How will generative AI really impact cyber security? Chris Wallis explores how the technology could be deployed in security contexts.
read more Sign up for the Intruder Monthly Newsletter AWS Penetration Testing: A CTO's Guide Considering AWS penetration testing? There are many options available, and knowing what you need will help you make your security budget go as far as possible.
read more January 17, 2020
Chris Wallis
User Enumeration in Microsoft Products: An Incident Waiting to Happen? Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
read more January 17, 2020
Daniel Andrew
How much does a penetration test cost & how to choose a vendor? Understand how penetration tests are quoted and find out what to look out for when choosing a vendor.
read more January 17, 2020
Daniel Andrew
Hacking The Entire Internet Just Got Easier The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more January 17, 2020
Daniel Andrew
Penetration Testing vs Vulnerability Scanning What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
read more January 17, 2020
Daniel Andrew
What is an Internal Pen Test? This time in our series on the different types of penetration test, we’re covering “Internal” pen tests, otherwise known as “Internal…
read more February 28, 2020
Lars Greiwe
What is a Penetration Test? This is the first article in a series explaining the different types of penetration testing — or “pen tests” for short. Because while many…
read more February 28, 2020
Lars Greiwe