Vulnerabilities and Threats

Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)

Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)

Ghost CVEs are vulnerabilities disclosed in GitHub and advisories before hitting NVD. Tracking them lets us patch threats days faster than teams waiting for official databases.
Vulnerabilities and Threats
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare

Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare

A developing security situation involving Clawdbot (recently rebranded as Moltbot) - an open-source, self-hosted AI assistant.
Vulnerabilities and Threats
The Top Vulnerabilities of 2025

The Top Vulnerabilities of 2025

Drawing on data from over 3,000 environments, this report ranks the six biggest vulnerabilities of 2025.
Vulnerabilities and Threats
Private Bug Bounty: Finding The Needle In The Haystack

Private Bug Bounty: Finding The Needle In The Haystack

Discover how our security team uncovered complex vulnerabilities that required human expertise to detect - helping our customers stay ahead of emerging threats.
Vulnerabilities and Threats
Introducing Your New Favorite Resource For Staying Ahead Of Threats

Introducing Your New Favorite Resource For Staying Ahead Of Threats

When one of our go-to resources, cvetrends.com, shut down last year, it left us with no choice but to build our own. Meet our free vulnerability intelligence resource.
Vulnerabilities and Threats
What is the OpenSSH regreSSHion vulnerability (CVE-2024-6387)?

What is the OpenSSH regreSSHion vulnerability (CVE-2024-6387)?

Get the latest on the OpenSSH regreSSHion vulnerability (CVE-2024-6387). Intruder's Security team explain what it is, its potential impact, and what action you need to take.
Vulnerabilities and Threats
Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know

Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know

Get the latest on the Progress MOVEit vulnerability (CVE-2024-5806). Intruder's Security Team explain what it is and what action you can take.
Vulnerabilities and Threats
CVE-2024-24919: Check Point Security Gateways Vulnerability Explained

CVE-2024-24919: Check Point Security Gateways Vulnerability Explained

Find out all you need to know about the Check Point Security Gateways vulnerability (CVE-2024-24919): what is it, which systems are at risk, and how can Intruder help?
Vulnerabilities and Threats
CVE-2024-3400: What is the Palo Alto GlobalProtect vulnerability?

CVE-2024-3400: What is the Palo Alto GlobalProtect vulnerability?

Get the latest on the Palo Alto GlobalProtect vulnerability (CVE-2024-3400), including how Intruder's Attack Surface view can help you check for it.
Vulnerabilities and Threats
Is the XZ Utils CVE-2024-3094 as bad as we fear?

Is the XZ Utils CVE-2024-3094 as bad as we fear?

Find out everything you need to know about the xz-utils vulnerability (CVE-2024-3094) and what you should do if your systems are at risk.
Vulnerabilities and Threats
How bad is the Citrix Bleed vulnerability [CVE-2023-4966]?

How bad is the Citrix Bleed vulnerability [CVE-2023-4966]?

Get our take on the impact of the NetScaler vulnerability, see if you're affected, and find out how to fix it.
Vulnerabilities and Threats
How bad is the Cisco IOS XE vulnerability [CVE-2023-20198]?

How bad is the Cisco IOS XE vulnerability [CVE-2023-20198]?

Intruder's experts explain the severity of Cisco IOS XE zero-day vulnerability, whether you're affected, and how to mitigate any risk.
Vulnerabilities and Threats
How Serious Is The Curl [CVE-2023-38545] Vulnerability?

How Serious Is The Curl [CVE-2023-38545] Vulnerability?

Intruder's security expert explains what the curl vulnerability is, whether you should be concerned about it, and how to identify and fix it.
Vulnerabilities and Threats
Is Looney Tunables [CVE-2023-4911] as bad as everyone says?

Is Looney Tunables [CVE-2023-4911] as bad as everyone says?

Grab security updates for your Linux distributions because there's a security hole that can be easily exploited by rogue users, intruders, & malicious software to gain root access.
Vulnerabilities and Threats
Don't get hooked: How to protect yourself against phishing

Don't get hooked: How to protect yourself against phishing

Phishing isn't going away any time soon. Learn about the latest attack techniques and scam examples so you can better protect your business.
Vulnerabilities and Threats
Top SaaS cybersecurity threats in 2023: are you ready?

Top SaaS cybersecurity threats in 2023: are you ready?

Focus on these key areas to secure your environments and safeguard your success in 2023. Make sure you're only in the news when you want to be.
Vulnerabilities and Threats
Security Update: OpenSSL High Vulnerability (CVE-2022-3602)

Security Update: OpenSSL High Vulnerability (CVE-2022-3602)

The OpenSSL project has pre-announced a new and critical vulnerability that will be fixed in OpenSSL version 3.0.7, expected 1 November 2022. Updates to this announcement will ...
Vulnerabilities and Threats
5 Network Security Threats And How To Protect Yourself

5 Network Security Threats And How To Protect Yourself

Cybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data...
Vulnerabilities and Threats
Spring4Shell [CVE-2022-22965]: All you need to know

Spring4Shell [CVE-2022-22965]: All you need to know

Spring4Shell is a critical vulnerability (CVSSv3 9.8) targetting Java’s most popular framework, Spring, and was disclosed on 31 March ...
Vulnerabilities and Threats
Log4j vulnerability: what is it and how to detect it?

Log4j vulnerability: what is it and how to detect it?

Apache Log4j is a logging package for Java which has been widely adopted and integrated into many applications. Developers need a way of ...
Vulnerabilities and Threats
How to Keep on Top of Emerging Cyber Threats

How to Keep on Top of Emerging Cyber Threats

Every single day around 60 new vulnerabilities are discovered in software used throughout the world. Not all are serious but just one can...
Vulnerabilities and Threats
9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

Our research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out ...
Vulnerabilities and Threats
SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?

SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?

A new critical vulnerability in affecting Windows systems came to light on Tuesday, affecting SMB services used by the latest versions of...
Vulnerabilities and Threats
VENOM Explained

VENOM Explained

Over the last few days there’s been a lot of hype surrounding the recently released (and patched) VENOM vulnerability. This post hopes to…
Vulnerabilities and Threats
DROWN Vulnerability — More Like A Doggy Paddle

DROWN Vulnerability — More Like A Doggy Paddle

You may have heard of the new DROWN vulnerability as it’s been in the news a fair bit over the past couple of days.
Vulnerabilities and Threats
Badlock Vulnerability — Pre-Release Analysis

Badlock Vulnerability — Pre-Release Analysis

It seems that merely releasing a vulnerability with a cool logo and marketing budget isn’t enough these days. Like the movie studio behind…
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities

Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities

You may have heard of two new MySQL vulnerabilities in the news over the past couple of days (CVE-2016–6662 & CVE-2016–6663).
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)

Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)

Leaked from the NSA’s toolkit of private exploits, this recently disclosed Heartbleed-esque vulnerability can allow an attacker anywhere on…
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — Dirty COW Privilege Escalation

Intruder Vulnerability Bulletin — Dirty COW Privilege Escalation

You may have heard of a new Linux vulnerability named “Dirty COW” in the news today.
Vulnerabilities and Threats
Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin

Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin

A number of new vulnerabilities in Memcached were recently discovered, which affect versions of the software before 1.4.33.
Vulnerabilities and Threats
User Enumeration in Microsoft Products: An Incident Waiting to Happen?

User Enumeration in Microsoft Products: An Incident Waiting to Happen?

Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
Vulnerabilities and Threats
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
Vulnerabilities and Threats
Just how serious is the “ROBOT Attack”?

Just how serious is the “ROBOT Attack”?

The ROBOT attack. Sounds pretty ominous, right? Choosing catchy names for web-based cryptography (TLS) vulnerabilities has become pretty…
Vulnerabilities and Threats
Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya — How long should it take to patch against a globally recognised exploit, and why are attackers still able to use…
Vulnerabilities and Threats
Team Xball — DDoS Extortion Hoax

Team Xball — DDoS Extortion Hoax

“We are the Team Xball and we have chosen your website/network as target for our next DDoS attack.”
Vulnerabilities and Threats
Apache Struts — Remote Code Execution — CVE-2017–5638

Apache Struts — Remote Code Execution — CVE-2017–5638

On March 7th a critical vulnerability was announced in the Apache Struts framework, a popular web development toolkit that is commonly used…
Vulnerabilities and Threats
200,000 websites still affected by three year old security weakness (Heartbleed)

200,000 websites still affected by three year old security weakness (Heartbleed)

The Heartbleed vulnerability, renowned for allowing hackers anywhere on the internet to access encrypted communication between websites and…
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities

Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities

A number of vulnerabilities were recently discovered, which affect email sending functionality in the following software libraries:
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability

Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability

A vulnerability in the PHPMailer library was recently discovered, which affects versions of the software before 5.2.18.
Vulnerabilities and Threats