Platform
Vulnerability Management
Scan, prioritize, remediate
AI Security Automation
Act faster
Attack Surface Management
Detect changes and hidden assets
Integrations
Compliance and workflow management
Cloud Security
Daily config checks
Solutions
External Scanning
Infrastructure security
Attack Surface Monitoring
Respond to changes
DAST
Secure web apps
Website Security
140k+ checks
Risk Based Prioritization
No more alert fatigue
API Security
Test your APIs
Asset Discovery
Reveal unknown targets
Emerging Threat Detection
Check and act fast
CSPM
Daily cloud config checks
Compliance
SOC 2, ISO, HIPAA, DORA
Cyber Hygiene Reporting
Demonstrate progress
Container Image Scanning
Automated discovery and scanning
Secrets Detection
Prevent leaked credentials
Internal Scanning
Secure employee devices
Case Studies
Pricing
Resources
Free Tools
cvemon
Vulnerability intel
Autoswagger
Check for API auth flaws
Security
Security Research
Insights from our experts
Cyber Resource Hub
Guides & videos
Cyber Glossary
Learn the lingo
Customers
Help Center
FAQs & tutorials
Developer Hub
APIs & integrations
Trust Center
Security & compliance
Company
About Intruder
History and mission
Press
News and interviews
Partner Program
Become a reseller
Careers
Work with us
Contact
Get in touch
BOOK A DEMO
Try free
Log in
Log in
Try for free
BOOK A DEMO
Vulnerabilities and Threats
Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)
Ghost CVEs are vulnerabilities disclosed in GitHub and advisories before hitting NVD. Tracking them lets us patch threats days faster than teams waiting for official databases.
Daniel Andrew
February 3, 2026
Vulnerabilities and Threats
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)
Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Daniel Andrew
January 30, 2026
Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare
A developing security situation involving Clawdbot (recently rebranded as Moltbot) - an open-source, self-hosted AI assistant.
Benjamin Marr
January 27, 2026
Vulnerabilities and Threats
The Top Vulnerabilities of 2025
Drawing on data from over 3,000 environments, this report ranks the six biggest vulnerabilities of 2025.
Eamon Carroll
January 13, 2026
Vulnerabilities and Threats
Private Bug Bounty: Finding The Needle In The Haystack
Discover how our security team uncovered complex vulnerabilities that required human expertise to detect - helping our customers stay ahead of emerging threats.
Daniel Andrew
February 5, 2025
Vulnerabilities and Threats
Introducing Your New Favorite Resource For Staying Ahead Of Threats
When one of our go-to resources, cvetrends.com, shut down last year, it left us with no choice but to build our own. Meet our free vulnerability intelligence resource.
Chris Wallis
November 14, 2024
Vulnerabilities and Threats
What is the OpenSSH regreSSHion vulnerability (CVE-2024-6387)?
Get the latest on the OpenSSH regreSSHion vulnerability (CVE-2024-6387). Intruder's Security team explain what it is, its potential impact, and what action you need to take.
Benjamin Marr
July 2, 2024
Vulnerabilities and Threats
Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know
Get the latest on the Progress MOVEit vulnerability (CVE-2024-5806). Intruder's Security Team explain what it is and what action you can take.
Benjamin Marr
June 26, 2024
Vulnerabilities and Threats
CVE-2024-24919: Check Point Security Gateways Vulnerability Explained
Find out all you need to know about the Check Point Security Gateways vulnerability (CVE-2024-24919): what is it, which systems are at risk, and how can Intruder help?
Benjamin Marr
May 30, 2024
Vulnerabilities and Threats
CVE-2024-3400: What is the Palo Alto GlobalProtect vulnerability?
Get the latest on the Palo Alto GlobalProtect vulnerability (CVE-2024-3400), including how Intruder's Attack Surface view can help you check for it.
Benjamin Marr
April 16, 2024
Vulnerabilities and Threats
Is the XZ Utils CVE-2024-3094 as bad as we fear?
Find out everything you need to know about the xz-utils vulnerability (CVE-2024-3094) and what you should do if your systems are at risk.
Benjamin Marr
April 3, 2024
Vulnerabilities and Threats
How bad is the Citrix Bleed vulnerability [CVE-2023-4966]?
Get our take on the impact of the NetScaler vulnerability, see if you're affected, and find out how to fix it.
Daniel Andrew
October 25, 2023
Vulnerabilities and Threats
How bad is the Cisco IOS XE vulnerability [CVE-2023-20198]?
Intruder's experts explain the severity of Cisco IOS XE zero-day vulnerability, whether you're affected, and how to mitigate any risk.
Adam Oliver
October 18, 2023
Vulnerabilities and Threats
How Serious Is The Curl [CVE-2023-38545] Vulnerability?
Intruder's security expert explains what the curl vulnerability is, whether you should be concerned about it, and how to identify and fix it.
Benjamin Marr
October 11, 2023
Vulnerabilities and Threats
Is Looney Tunables [CVE-2023-4911] as bad as everyone says?
Grab security updates for your Linux distributions because there's a security hole that can be easily exploited by rogue users, intruders, & malicious software to gain root access.
Sam Pizzey
October 6, 2023
Vulnerabilities and Threats
Don't get hooked: How to protect yourself against phishing
Phishing isn't going away any time soon. Learn about the latest attack techniques and scam examples so you can better protect your business.
Joe Haigh
September 12, 2023
Vulnerabilities and Threats
Top SaaS cybersecurity threats in 2023: are you ready?
Focus on these key areas to secure your environments and safeguard your success in 2023. Make sure you're only in the news when you want to be.
James Harrison
January 10, 2023
Vulnerabilities and Threats
Security Update: OpenSSL High Vulnerability (CVE-2022-3602)
The OpenSSL project has pre-announced a new and critical vulnerability that will be fixed in OpenSSL version 3.0.7, expected 1 November 2022. Updates to this announcement will ...
Benjamin Marr
November 1, 2022
Vulnerabilities and Threats
5 Network Security Threats And How To Protect Yourself
Cybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data...
Chris Wallis
September 1, 2022
Vulnerabilities and Threats
Spring4Shell [CVE-2022-22965]: All you need to know
Spring4Shell is a critical vulnerability (CVSSv3 9.8) targetting Java’s most popular framework, Spring, and was disclosed on 31 March ...
Benjamin Marr
April 5, 2022
Vulnerabilities and Threats
Log4j vulnerability: what is it and how to detect it?
Apache Log4j is a logging package for Java which has been widely adopted and integrated into many applications. Developers need a way of ...
Andy Hornegold
December 15, 2021
Vulnerabilities and Threats
How to Keep on Top of Emerging Cyber Threats
Every single day around 60 new vulnerabilities are discovered in software used throughout the world. Not all are serious but just one can...
Chris Wallis
January 9, 2022
Vulnerabilities and Threats
9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot
Our research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out ...
Daniel Andrew
July 7, 2020
Vulnerabilities and Threats
SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?
A new critical vulnerability in affecting Windows systems came to light on Tuesday, affecting SMB services used by the latest versions of...
Daniel Andrew
March 12, 2020
Vulnerabilities and Threats
VENOM Explained
Over the last few days there’s been a lot of hype surrounding the recently released (and patched) VENOM vulnerability. This post hopes to…
David Robinson
May 15, 2015
Vulnerabilities and Threats
DROWN Vulnerability — More Like A Doggy Paddle
You may have heard of the new DROWN vulnerability as it’s been in the news a fair bit over the past couple of days.
David Robinson
March 4, 2016
Vulnerabilities and Threats
Badlock Vulnerability — Pre-Release Analysis
It seems that merely releasing a vulnerability with a cool logo and marketing budget isn’t enough these days. Like the movie studio behind…
David Robinson
April 11, 2016
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities
You may have heard of two new MySQL vulnerabilities in the news over the past couple of days (CVE-2016–6662 & CVE-2016–6663).
David Robinson
September 13, 2016
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)
Leaked from the NSA’s toolkit of private exploits, this recently disclosed Heartbleed-esque vulnerability can allow an attacker anywhere on…
David Robinson
September 20, 2016
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — Dirty COW Privilege Escalation
You may have heard of a new Linux vulnerability named “Dirty COW” in the news today.
David Robinson
October 21, 2016
Vulnerabilities and Threats
Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin
A number of new vulnerabilities in Memcached were recently discovered, which affect versions of the software before 1.4.33.
David Robinson
November 2, 2016
Vulnerabilities and Threats
User Enumeration in Microsoft Products: An Incident Waiting to Happen?
Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
Daniel Andrew
September 26, 2019
Vulnerabilities and Threats
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)
Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
Daniel Andrew
May 15, 2019
Vulnerabilities and Threats
Just how serious is the “ROBOT Attack”?
The ROBOT attack. Sounds pretty ominous, right? Choosing catchy names for web-based cryptography (TLS) vulnerabilities has become pretty…
Daniel Andrew
December 18, 2017
Vulnerabilities and Threats
Petya or NotPetya, Why is MS17–010 Still Not Patched?
Petya or NotPetya — How long should it take to patch against a globally recognised exploit, and why are attackers still able to use…
Daniel Andrew
June 30, 2017
Vulnerabilities and Threats
Team Xball — DDoS Extortion Hoax
“We are the Team Xball and we have chosen your website/network as target for our next DDoS attack.”
Daniel Andrew
June 15, 2017
Vulnerabilities and Threats
Apache Struts — Remote Code Execution — CVE-2017–5638
On March 7th a critical vulnerability was announced in the Apache Struts framework, a popular web development toolkit that is commonly used…
Chris Wallis
March 9, 2017
Vulnerabilities and Threats
200,000 websites still affected by three year old security weakness (Heartbleed)
The Heartbleed vulnerability, renowned for allowing hackers anywhere on the internet to access encrypted communication between websites and…
Chris Wallis
January 24, 2017
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities
A number of vulnerabilities were recently discovered, which affect email sending functionality in the following software libraries:
David Robinson
January 3, 2017
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability
A vulnerability in the PHPMailer library was recently discovered, which affects versions of the software before 5.2.18.
David Robinson
December 27, 2016
Vulnerabilities and Threats
Sign up for your free 14-day trial
Start today