AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Clear all filters
Just how serious is the “ROBOT Attack”?

Just how serious is the “ROBOT Attack”?

The ROBOT attack. Sounds pretty ominous, right? Choosing catchy names for web-based cryptography (TLS) vulnerabilities has become pretty…
Vulnerabilities and Threats
“The Norwegian Government hacked my startup!”

“The Norwegian Government hacked my startup!”

At least, that’s how the conversation started, on a Whatsapp message early on a Friday evening in October, when a concerned startup founder…
Insights
Is Your Web Browser Secretly Mining Bitcoins?

Is Your Web Browser Secretly Mining Bitcoins?

This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
Insights
Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya, Why is MS17–010 Still Not Patched?

Petya or NotPetya — How long should it take to patch against a globally recognised exploit, and why are attackers still able to use…
Vulnerabilities and Threats
Team Xball — DDoS Extortion Hoax

Team Xball — DDoS Extortion Hoax

“We are the Team Xball and we have chosen your website/network as target for our next DDoS attack.”
Vulnerabilities and Threats
Apache Struts — Remote Code Execution — CVE-2017–5638

Apache Struts — Remote Code Execution — CVE-2017–5638

On March 7th a critical vulnerability was announced in the Apache Struts framework, a popular web development toolkit that is commonly used…
Vulnerabilities and Threats
200,000 websites still affected by three year old security weakness (Heartbleed)

200,000 websites still affected by three year old security weakness (Heartbleed)

The Heartbleed vulnerability, renowned for allowing hackers anywhere on the internet to access encrypted communication between websites and…
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities

Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities

A number of vulnerabilities were recently discovered, which affect email sending functionality in the following software libraries:
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability

Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability

A vulnerability in the PHPMailer library was recently discovered, which affects versions of the software before 5.2.18.
Vulnerabilities and Threats
Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin

Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin

A number of new vulnerabilities in Memcached were recently discovered, which affect versions of the software before 1.4.33.
Vulnerabilities and Threats
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.