Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #4

The Vulnerabulletin Issue #4

Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Beyond Compliance: What Actually Builds Customer Trust

Beyond Compliance: What Actually Builds Customer Trust

Compliance frameworks help you pass an audit; continuous compliance helps you keep customer confidence.
See TODAY’S CVE TRENDS
Clear all filters
Agent-Based vs Network-Based Internal Vulnerability Scanning

Agent-Based vs Network-Based Internal Vulnerability Scanning

Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
Vulnerability scanning
Mind the gap – how to ensure your vulnerability detection methods are up to scratch

Mind the gap – how to ensure your vulnerability detection methods are up to scratch

With global cyber crime costs expected to reach $10.5 trillion annually by 2025, it comes as little surprise that the risk of attack ...
Vulnerability scanning
Penetration testing
What Are Fake Clickjacking Bug Bounty Reports?

What Are Fake Clickjacking Bug Bounty Reports?

Beware, there’s a new trend in play, concerning a new type of fake clickjacking bug bounty reports. Read on to understand what to ...
Insights
Spring4Shell [CVE-2022-22965]: All you need to know

Spring4Shell [CVE-2022-22965]: All you need to know

Spring4Shell is a critical vulnerability (CVSSv3 9.8) targetting Java’s most popular framework, Spring, and was disclosed on 31 March ...
Vulnerabilities and Threats
Announcing Authenticated Scanning: Enhance Your Web Application Security With More In-depth Checks

Announcing Authenticated Scanning: Enhance Your Web Application Security With More In-depth Checks

Today we are thrilled to announce the release of authenticated web application scanning! This new capability allows our customers to ...
Product
How to Keep on Top of Emerging Cyber Threats

How to Keep on Top of Emerging Cyber Threats

Every single day around 60 new vulnerabilities are discovered in software used throughout the world. Not all are serious but just one can...
Vulnerabilities and Threats
Log4j vulnerability: what is it and how to detect it?

Log4j vulnerability: what is it and how to detect it?

Apache Log4j is a logging package for Java which has been widely adopted and integrated into many applications. Developers need a way of ...
Vulnerabilities and Threats
Announcing Changes to our Essential plan

Announcing Changes to our Essential plan

To ensure our product keeps pace and remains relevant for our customers and their requirements, we’re always asking for feedback to learn...
Product
Interview With Chris Wallis, the Founder & CEO of Intruder

Interview With Chris Wallis, the Founder & CEO of Intruder

Safety Detectives: What motivated you to start Intruder? Chris Wallis: I was working in a finance organization when a new vulnerability...
In the News
9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

9 minutes to breach: the life expectancy of an unsecured MongoDB honeypot

Our research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out ...
Vulnerabilities and Threats
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.