Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #6

The Vulnerabulletin Issue #6

Issue 6 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
EPSS vs. CVSS: what’s the best approach to vulnerability prioritization?

EPSS vs. CVSS: what’s the best approach to vulnerability prioritization?

Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
See TODAY’S CVE TRENDS
Clear all filters
Building a Secure Container Registry Strategy

Building a Secure Container Registry Strategy

Container registries are a critical attack surface. Learn how to secure them and how Intruder automates image discovery and scanning.
Cloud security
Guides
19 Cyber Leaders to Follow on LinkedIn (and Why They Deserve Your Attention)

19 Cyber Leaders to Follow on LinkedIn (and Why They Deserve Your Attention)

Cut through LinkedIn noise with 20 security leaders sharing real-world insights. From malware analysis to AppSec to vulnerability intel—voices that help you do better work.
Insights
Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)

Ghost CVEs: The Vulnerabilities You Don't Know About (Yet)

Ghost CVEs are vulnerabilities disclosed in GitHub and advisories before hitting NVD. Tracking them lets us patch threats days faster than teams waiting for official databases.
Vulnerabilities and Threats
Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Ivanti EPMM: Another Day, Another Pre-Auth RCE (CVE-2026-1281 & CVE-2026-1340)

Critical RCE vulnerabilities (CVE-2026-1281 & CVE-2026-1340) have been discovered in Ivanti EPMM
Vulnerabilities and Threats
Insights
What Your Security and Trust Program Needs to Look Like in 2026

What Your Security and Trust Program Needs to Look Like in 2026

A conversation between Hannah Payne, head of customer success at Intruder, and Ashley Hyman, VP of customer experience at Drata, about how security and compliance are changing.
Compliance
Guides
Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare

Clawdbot (Moltbot): When "Easy AI" Becomes a Security Nightmare

A developing security situation involving Clawdbot (recently rebranded as Moltbot) - an open-source, self-hosted AI assistant.
Vulnerabilities and Threats
Insights
The Vulnerabulletin Issue #3

The Vulnerabulletin Issue #3

Issue 3 of our monthly newsletter, packed with research, industry news and Intruder updates.
In the News
Insights
Product
The Top Vulnerabilities of 2025

The Top Vulnerabilities of 2025

Drawing on data from over 3,000 environments, this report ranks the six biggest vulnerabilities of 2025.
Vulnerabilities and Threats
Validate and Remediate Faster With In-Platform Commenting

Validate and Remediate Faster With In-Platform Commenting

Intruder now lets teams comment directly on issues and occurrences, keeping remediation context in one place. The result: faster fixes and shorter exposure to risk.
Product
The Vulnerabulletin Issue #2

The Vulnerabulletin Issue #2

Issue 2 of our monthly newsletter, packed with research, industry news and Intruder updates.
In the News
Insights
Product
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.