AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Clear all filters
Announcing Changes to our Essential plan

Announcing Changes to our Essential plan

To ensure our product keeps pace and remains relevant for our customers and their requirements, we’re always asking for feedback to learn...
Product
Interview With Chris Wallis, the Founder & CEO of Intruder

Interview With Chris Wallis, the Founder & CEO of Intruder

Safety Detectives: What motivated you to start Intruder? Chris Wallis: I was working in a finance organization when a new vulnerability...
In the News
9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

Our research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out ...
Vulnerabilities and Threats
SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?

SMBGhost: Strange SMB Vulnerability Disclosures and Wannacry 2.0?

A new critical vulnerability in affecting Windows systems came to light on Tuesday, affecting SMB services used by the latest versions of...
Vulnerabilities and Threats
User Enumeration in Microsoft Products: An Incident Waiting to Happen?

User Enumeration in Microsoft Products: An Incident Waiting to Happen?

Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
Vulnerabilities and Threats
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
Vulnerabilities and Threats
How to secure the Kubernetes API behind a VPN

How to secure the Kubernetes API behind a VPN

Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
Insights
Cyber security: 7 top tips for SMEs

Cyber security: 7 top tips for SMEs

With news headlines focused on security breaches in large organisations, it would be easy for small to medium enterprises (SMEs) to…
Insights
Hacking The Entire Internet Just Got Easier

Hacking The Entire Internet Just Got Easier

The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
Insights
How serious are the Intel / Meltdown / Spectre flaws?

How serious are the Intel / Meltdown / Spectre flaws?

We’re only a few days into 2018, and already we have a cyber-security panic on our hands. Predictions about the year ahead being full of...
Insights
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.