Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #6

The Vulnerabulletin Issue #6

Issue 6 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
EPSS vs. CVSS: what’s the best approach to vulnerability prioritization?

EPSS vs. CVSS: what’s the best approach to vulnerability prioritization?

Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
See TODAY’S CVE TRENDS
Clear all filters
NCSC Web Check is Retiring. Here’s Your Intuitive, Modern Alternative.

NCSC Web Check is Retiring. Here’s Your Intuitive, Modern Alternative.

The National Cyber Security Centre (NCSC) has confirmed that Web Check and Mail Check will be retired by March 2026. 
In the News
Closing the Visibility Gap: Intruder Improves Automated Asset Discovery to Help Security Teams Tackle Shadow IT

Closing the Visibility Gap: Intruder Improves Automated Asset Discovery to Help Security Teams Tackle Shadow IT

Intruder's improved asset discovery capabilities now use passive DNS data to help you uncover and secure Shadow IT
Attack surface management
In the News
The Vulnerabulletin Issue #1

The Vulnerabulletin Issue #1

Introducing our new monthly newsletter, packed with research, industry news and Intruder updates.
In the News
Insights
Product
Google Cloud Security: What’s Really On Your Shoulders

Google Cloud Security: What’s Really On Your Shoulders

Google Cloud secures its infrastructure, but customers are responsible for the rest. Discover common pitfalls and how to fix them with best practices.
Cloud security
Guides
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Guides
Say It, Secure It: Streamline Exposure Management with Claude + Intruder's MCP Server

Say It, Secure It: Streamline Exposure Management with Claude + Intruder's MCP Server

Learn how you can execute tasks and gather insights from Intruder with our new MCP server + Claude AI.
Product
Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

From superheroes to neon villains, discover how our new pricing plan designs came to life through playful ideas, team feedback, and a love for visual storytelling.
Product
How To Catch People Using AI During Interviews

How To Catch People Using AI During Interviews

Get our top tips for reducing the impact of AI on interviews - including how to reduce your candidate pipeline, conduct facial symmetry analysis, and more.
Guides
AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
Guides
Moving Vulnerability Management from Chaos to Confidence (Key Takeaways)

Moving Vulnerability Management from Chaos to Confidence (Key Takeaways)

Key takeaways from our recent vulnerability management roundtable: how to engage leadership, prioritize real risk, and move from chaos to confidence.
Vulnerability management
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.