Blog

Read our latest news, research & expert advice on cyber security

More from us

Clear all filters
User Enumeration in Microsoft Products: An Incident Waiting to Happen?
Vulnerabilities and Threats

User Enumeration in Microsoft Products: An Incident Waiting to Happen?

Daniel Andrew
September 26, 2019
min read
Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)
Vulnerabilities and Threats

Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Daniel Andrew
May 15, 2019
min read
Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
How to secure the Kubernetes API behind a VPN
Insights

How to secure the Kubernetes API behind a VPN

Lefteris Nikoltsios
December 7, 2018
min read
Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
Cyber security: 7 top tips for SMEs
Insights

Cyber security: 7 top tips for SMEs

Chris Wallis
November 27, 2018
min read
With news headlines focused on security breaches in large organisations, it would be easy for small to medium enterprises (SMEs) to…
Hacking The Entire Internet Just Got Easier
Insights

Hacking The Entire Internet Just Got Easier

Daniel Andrew
March 5, 2018
min read
The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
How serious are the Intel / Meltdown / Spectre flaws?
Insights

How serious are the Intel / Meltdown / Spectre flaws?

Chris Wallis
January 5, 2018
min read
We’re only a few days into 2018, and already we have a cyber-security panic on our hands. Predictions about the year ahead being full of...
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.