Platform
Vulnerability Management
Scan, prioritize, remediate
AI Security Automation
Act faster
Attack Surface Management
Detect changes and hidden assets
Integrations
Compliance and workflow management
Cloud Security
Daily config checks
Solutions
External Scanning
Infrastructure security
Attack Surface Monitoring
Respond to changes
DAST
Secure web apps
Website Security
140k+ checks
Risk Based Prioritization
No more alert fatigue
API Security
Test your APIs
Asset Discovery
Reveal unknown targets
Emerging Threat Detection
Check and act fast
CSPM
Daily cloud config checks
Compliance
SOC 2, ISO, HIPAA, DORA
Cyber Hygiene Reporting
Demonstrate progress
Container Image Scanning
Automated discovery and scanning
Secrets Detection
Prevent leaked credentials
Internal Scanning
Secure employee devices
Case Studies
Pricing
Resources
Free Tools
cvemon
Vulnerability intel
Autoswagger
Check for API auth flaws
Security
Security Research
Insights from our experts
Cyber Resource Hub
Guides & videos
Cyber Glossary
Learn the lingo
Customers
Help Center
FAQs & tutorials
Developer Hub
APIs & integrations
Trust Center
Security & compliance
Company
About Intruder
History and mission
Press
News and interviews
Partner Program
Become a reseller
Careers
Work with us
Contact
Get in touch
BOOK A DEMO
Try free
Log in
Log in
Try for free
BOOK A DEMO
Insights
The Vulnerabulletin Issue #5
Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
Dann Moore
March 18, 2026
The Vulnerabulletin Issue #4
Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Dann Moore
February 18, 2026
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)
Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Daniel Andrew
January 30, 2026
Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare
A developing security situation involving Clawdbot (recently rebranded as Moltbot) - an open-source, self-hosted AI assistant.
Benjamin Marr
January 27, 2026
Vulnerabilities and Threats
The Vulnerabulletin Issue #3
Issue 3 of our monthly newsletter, packed with research, industry news and Intruder updates.
Dann Moore
January 21, 2026
The Vulnerabulletin Issue #2
Issue 2 of our monthly newsletter, packed with research, industry news and Intruder updates.
Dann Moore
December 3, 2025
The Vulnerabulletin Issue #1
Introducing our new monthly newsletter, packed with research, industry news and Intruder updates.
Dann Moore
November 3, 2025
19 Cyber Leaders to Follow on LinkedIn (and Why They Deserve Your Attention)
Cut through LinkedIn noise with 20 security leaders sharing real-world insights. From malware analysis to AppSec to vulnerability intel—voices that help you do better work.
Eamon Carroll
February 5, 2026
Insights
6 Cyber Security Trends For 2024 And How To Stay Ahead
Andy Hornegold shares his cybersecurity predictions for 2024. From more zero-day attacks to exposure management and increased regulation, is your organization ready?
Andy Hornegold
February 22, 2024
Insights
Attack surface management: Find your assets before the hackers do
Find out how Daniel Thatcher demonstrated the importance of attack surface management to delegates at DTX Europe.
Daniel Thatcher
October 18, 2023
Attack surface management
How to build a resilient remote-working business
How to reduce the digital risks of remote working, including the red team experience of Product Lead, Andy Hornegold.
James Harrison
August 17, 2023
Insights
8 takeaways from M-Trends 2023
Mandiant’s annual report has important insights from the cybersecurity frontline. No time to read it? We've got all the key findings for you.
James Harrison
July 13, 2023
Insights
How will generative AI really impact cyber security?
Chris Wallis explores how the technology could be deployed in security contexts.
Chris Wallis
May 25, 2023
Insights
28 cyber security stats and facts you need to know in 2023
Discover the scale of today's cyber security challenges and how to stay ahead with our top tips.
James Harrison
May 5, 2023
Insights
How to report on vulnerability management to the board
Board members don’t care about vulnerability management, but do they care about risk. Read our CSO/CISO guide on how to engage them in terms they understand.
James Harrison
March 30, 2023
Insights
Everything you need to know about cyber insurance
Cyber insurance won’t protect you from cybercrime, but it can provide financial security if you’re attacked. In this guide we’ll explain what cyber insurance covers.
James Harrison
February 21, 2023
Insights
Top online port scanners and how they work [2026]
Open ports are a gateway to your systems. Find the right tools to check which ports are secure, and which ports attackers can exploit.
James Harrison
April 24, 2023
Insights
What Are Fake Clickjacking Bug Bounty Reports?
Beware, there’s a new trend in play, concerning a new type of fake clickjacking bug bounty reports. Read on to understand what to ...
Daniel Thatcher
April 14, 2022
Insights
Should the data on my server be encrypted?
Over the last few days I’ve heard a lot of questions in the media asking why TalkTalk didn’t have their customer data encrypted.
Chris Wallis
October 25, 2015
Insights
Days of Cyber: What’s an SME to do? (Threat Landscape)
This will be the first in a series of blog posts exploring the world of cyber security, with a specific view on how it applies to SMEs; and…
Chris Wallis
May 6, 2016
Insights
I’m a startup, what should I do about security?
Being a startup is difficult. You don’t have the budget to do everything like a big corporate, but if you don’t appear to be doing things…
Chris Wallis
June 20, 2016
Insights
What’s the point in phishing assessments?
As news is released that PhishMe made £45 million last year, it’s clear that phishing assessments have become very popular. But it begs the…
Chris Wallis
July 29, 2016
Insights
The battle for IoT Security has already been lost
A few weeks ago, the website of popular cyber security journalist Brian Krebs was taken offline by a previously undiscovered botnet, now…
Chris Wallis
October 21, 2016
Insights
How to secure the Kubernetes API behind a VPN
Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
Lefteris Nikoltsios
December 7, 2018
Insights
Cyber security: 7 top tips for SMEs
With news headlines focused on security breaches in large organisations, it would be easy for small to medium enterprises (SMEs) to…
Chris Wallis
November 27, 2018
Insights
Hacking The Entire Internet Just Got Easier
The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
Daniel Andrew
March 5, 2018
Insights
How serious are the Intel / Meltdown / Spectre flaws?
We’re only a few days into 2018, and already we have a cyber-security panic on our hands. Predictions about the year ahead being full of...
Chris Wallis
January 5, 2018
Insights
“The Norwegian Government hacked my startup!”
At least, that’s how the conversation started, on a Whatsapp message early on a Friday evening in October, when a concerned startup founder…
Chris Wallis
December 8, 2017
Insights
Is Your Web Browser Secretly Mining Bitcoins?
This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
Daniel Andrew
December 1, 2017
Insights
Sign up for your free 14-day trial
Start today