AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Clear all filters
Streamlining the chaos of vulnerability management

Streamlining the chaos of vulnerability management

When Product Lead, Andy Hornegold, was asked to speak at DTX Europe, he used the Optus breach in Australia to show how vulnerability scanning could ...
Vulnerability management
Does the OWASP Top 10 still matter?

Does the OWASP Top 10 still matter?

What is the OWASP Top 10, and – just as important – what is it not? Find out how you can make the report work for your business
Application security
5 Network Security Threats And How To Protect Yourself

5 Network Security Threats And How To Protect Yourself

Cybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data...
Vulnerabilities and Threats
Agent-Based vs Network-Based Internal Vulnerability Scanning

Agent-Based vs Network-Based Internal Vulnerability Scanning

Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
Vulnerability scanning
Mind the gap – how to ensure your vulnerability detection methods are up to scratch

Mind the gap – how to ensure your vulnerability detection methods are up to scratch

With global cyber crime costs expected to reach $10.5 trillion annually by 2025, it comes as little surprise that the risk of attack ...
Vulnerability scanning
What Are Fake Clickjacking Bug Bounty Reports?

What Are Fake Clickjacking Bug Bounty Reports?

Beware, there’s a new trend in play, concerning a new type of fake clickjacking bug bounty reports. Read on to understand what to ...
Insights
Spring4Shell [CVE-2022-22965]: All you need to know

Spring4Shell [CVE-2022-22965]: All you need to know

Spring4Shell is a critical vulnerability (CVSSv3 9.8) targetting Java’s most popular framework, Spring, and was disclosed on 31 March ...
Vulnerabilities and Threats
Announcing Authenticated Scanning: Enhance Your Web Application Security With More In-depth Checks

Announcing Authenticated Scanning: Enhance Your Web Application Security With More In-depth Checks

Today we are thrilled to announce the release of authenticated web application scanning! This new capability allows our customers to ...
Product
How to Keep on Top of Emerging Cyber Threats

How to Keep on Top of Emerging Cyber Threats

Every single day around 60 new vulnerabilities are discovered in software used throughout the world. Not all are serious but just one can...
Vulnerabilities and Threats
Log4j vulnerability: what is it and how to detect it?

Log4j vulnerability: what is it and how to detect it?

Apache Log4j is a logging package for Java which has been widely adopted and integrated into many applications. Developers need a way of ...
Vulnerabilities and Threats
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.