Insights

The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #4

The Vulnerabulletin Issue #4

Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare

Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare

A developing security situation involving Clawdbot (recently rebranded as Moltbot) - an open-source, self-hosted AI assistant.
Vulnerabilities and Threats
The Vulnerabulletin Issue #3

The Vulnerabulletin Issue #3

Issue 3 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #2

The Vulnerabulletin Issue #2

Issue 2 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #1

The Vulnerabulletin Issue #1

Introducing our new monthly newsletter, packed with research, industry news and Intruder updates.
19 Cyber Leaders to Follow on LinkedIn (and Why They Deserve Your Attention)

19 Cyber Leaders to Follow on LinkedIn (and Why They Deserve Your Attention)

Cut through LinkedIn noise with 20 security leaders sharing real-world insights. From malware analysis to AppSec to vulnerability intel—voices that help you do better work.
Insights
6 Cyber Security Trends For 2024 And How To Stay Ahead

6 Cyber Security Trends For 2024 And How To Stay Ahead

Andy Hornegold shares his cybersecurity predictions for 2024. From more zero-day attacks to exposure management and increased regulation, is your organization ready?
Insights
Attack surface management: Find your assets before the hackers do

Attack surface management: Find your assets before the hackers do

Find out how Daniel Thatcher demonstrated the importance of attack surface management to delegates at DTX Europe.
Attack surface management
How to build a resilient remote-working business

How to build a resilient remote-working business

How to reduce the digital risks of remote working, including the red team experience of Product Lead, Andy Hornegold.
Insights
8 takeaways from M-Trends 2023

8 takeaways from M-Trends 2023

Mandiant’s annual report has important insights from the cybersecurity frontline. No time to read it? We've got all the key findings for you.
Insights
How will generative AI really impact cyber security?

How will generative AI really impact cyber security?

Chris Wallis explores how the technology could be deployed in security contexts.
Insights
28 cyber security stats and facts you need to know in 2023

28 cyber security stats and facts you need to know in 2023

Discover the scale of today's cyber security challenges and how to stay ahead with our top tips.
Insights
How to report on vulnerability management to the board

How to report on vulnerability management to the board

Board members don’t care about vulnerability management, but do they care about risk. Read our CSO/CISO guide on how to engage them in terms they understand.
Insights
Everything you need to know about cyber insurance

Everything you need to know about cyber insurance

Cyber insurance won’t protect you from cybercrime, but it can provide financial security if you’re attacked. In this guide we’ll explain what cyber insurance covers.
Insights
Top online port scanners and how they work [2026]

Top online port scanners and how they work [2026]

Open ports are a gateway to your systems. Find the right tools to check which ports are secure, and which ports attackers can exploit.
Insights
What Are Fake Clickjacking Bug Bounty Reports?

What Are Fake Clickjacking Bug Bounty Reports?

Beware, there’s a new trend in play, concerning a new type of fake clickjacking bug bounty reports. Read on to understand what to ...
Insights
Should the data on my server be encrypted?

Should the data on my server be encrypted?

Over the last few days I’ve heard a lot of questions in the media asking why TalkTalk didn’t have their customer data encrypted.
Insights
Days of Cyber: What’s an SME to do? (Threat Landscape)

Days of Cyber: What’s an SME to do? (Threat Landscape)

This will be the first in a series of blog posts exploring the world of cyber security, with a specific view on how it applies to SMEs; and…
Insights
I’m a startup, what should I do about security?

I’m a startup, what should I do about security?

Being a startup is difficult. You don’t have the budget to do everything like a big corporate, but if you don’t appear to be doing things…
Insights
What’s the point in phishing assessments?

What’s the point in phishing assessments?

As news is released that PhishMe made £45 million last year, it’s clear that phishing assessments have become very popular. But it begs the…
Insights
The battle for IoT Security has already been lost

The battle for IoT Security has already been lost

A few weeks ago, the website of popular cyber security journalist Brian Krebs was taken offline by a previously undiscovered botnet, now…
Insights
How to secure the Kubernetes API behind a VPN

How to secure the Kubernetes API behind a VPN

Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
Insights
Cyber security: 7 top tips for SMEs

Cyber security: 7 top tips for SMEs

With news headlines focused on security breaches in large organisations, it would be easy for small to medium enterprises (SMEs) to…
Insights
Hacking The Entire Internet Just Got Easier

Hacking The Entire Internet Just Got Easier

The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
Insights
How serious are the Intel / Meltdown / Spectre flaws?

How serious are the Intel / Meltdown / Spectre flaws?

We’re only a few days into 2018, and already we have a cyber-security panic on our hands. Predictions about the year ahead being full of...
Insights
“The Norwegian Government hacked my startup!”

“The Norwegian Government hacked my startup!”

At least, that’s how the conversation started, on a Whatsapp message early on a Friday evening in October, when a concerned startup founder…
Insights
Is Your Web Browser Secretly Mining Bitcoins?

Is Your Web Browser Secretly Mining Bitcoins?

This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
Insights