Blog

The Vulnerabulletin Issue #1

Dann Moore
Author
Dann Moore
Marketing Coordinator

Key Points

Welcome to issue #1 of our new monthly cyber-circular The Vulnerabulletin, packed with research and insights from our in-house security experts, industry news and a rundown of what’s new in the Intruder platform.

Spooky season may be over, but could the hidden world of Shadow IT still be haunting you? Our new data-packed Exposure Management Index highlights key trends shaping the threat environment. Founder Chris shares insight into Intruder’s bootstrapped journey to $13M in annual revenue and 3,000+ customers on a recent episode of the CyberBytes podcast.  And finally we roundup the headlines and new releases getting us excited this month!

What we do in the shadows… 👻

Intruder’s security team ran an experiment: how much Shadow IT could we uncover using only public data? The answer: a terrifying amount - from backups with live credentials to admin panels with no authentication.

If those assets never make it into your vulnerability management program, they stay invisible to you, but not to attackers. Read the full research to make sure your Shadow IT doesn’t make headlines.

How does your org compare? 👀

AI is supercharging attackers, making it easier than ever to exploit weaknesses, whilst attack surfaces are ever-expanding with high severity vulnerabilities forecasted to end the year 20% higher than 2024. Our 2025 Exposure Management Index draws on data from 3,000 organizations to reveal how SMBs are coping with an intensifying threat environment.

The Intruder origin story 👾

At Black Hat 2025 our very own Chris Wallis got the chance to sit down with Oliver Legg, co-founder of Aspiron Search, for an episode of the CyberBytes podcast. From scaling without VC, the story behind Greg (our brand mascot 👾) and what’s next for cybersecurity with cloud and AI, it’s a great listen for founders and security leaders alike.

The Vulnerabulletin Board 📌

What our security team has been reading this month...

📖 The untold story of Log4Shell (Github Blog) - the breach that broke the internet.

💸 The true cost of the Jaguar Land Rover hack (BBC News) - the costliest cyber attack in UK history.

👨‍💻 Almost hacked by a ‘job interview’ (David Dodda) - how a coding interview became a sophisticated scam.

What's new in Intruder 💡

☁️ Google Cloud security - Intruder’s always-on cloud security posture management checks, now for Google Cloud.

👾 GregAI - our AI security analyst copilot, built to save time at all stages of your workflows.

🔄 Bidirectional Jira sync - view issue statuses and link directly to Jira all from within your Intruder account. 

Get our free

Ultimate Guide to Vulnerability Scanning

Learn everything you need to get started with vulnerability scanning and how to get the most out of your chosen product with our free PDF guide.

Recommended articles

No items found.