Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #6

The Vulnerabulletin Issue #6

Issue 6 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
EPSS vs. CVSS: what’s the best approach to vulnerability prioritization?

EPSS vs. CVSS: what’s the best approach to vulnerability prioritization?

Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
See TODAY’S CVE TRENDS
Clear all filters
Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know

Progress MOVEit Vulnerability (CVE-2024-5806): All You Need To Know

Get the latest on the Progress MOVEit vulnerability (CVE-2024-5806). Intruder's Security Team explain what it is and what action you can take.
Vulnerabilities and Threats
CVE-2024-24919: Check Point Security Gateways Vulnerability Explained

CVE-2024-24919: Check Point Security Gateways Vulnerability Explained

Find out all you need to know about the Check Point Security Gateways vulnerability (CVE-2024-24919): what is it, which systems are at risk, and how can Intruder help?
Vulnerabilities and Threats
Focus on what matters most: Exposure management and your attack surface

Focus on what matters most: Exposure management and your attack surface

Our VP of Product shares his insights on the importance of exposure management and how it can enable teams to achieve the greatest impact with the least time invested.
Attack surface management
What's new? Product updates from Intruder April 2024

What's new? Product updates from Intruder April 2024

Intruder’s attack surface management tools, AWS integration improvements, and enhanced web application scanning.
Product
Top 6 Vulnerability Management Tools and Software for 2026

Top 6 Vulnerability Management Tools and Software for 2026

Discover the top 6 vulnerability management tools to enhance your cybersecurity posture. Explore key features, value-adds & who they're best suited for.
Vulnerability management
Guides
CVE-2024-3400: What is the Palo Alto GlobalProtect vulnerability?

CVE-2024-3400: What is the Palo Alto GlobalProtect vulnerability?

Get the latest on the Palo Alto GlobalProtect vulnerability (CVE-2024-3400), including how Intruder's Attack Surface view can help you check for it.
Vulnerabilities and Threats
How To Perform A Vulnerability Assessment: Step-by-Step

How To Perform A Vulnerability Assessment: Step-by-Step

If you don’t want your organization to fall cyber attack victim, you need to be the first to find your weak spots. Learn all about how vulnerability assessments can help.
Vulnerability scanning
Guides
Is the XZ Utils CVE-2024-3094 as bad as we fear?

Is the XZ Utils CVE-2024-3094 as bad as we fear?

Find out everything you need to know about the xz-utils vulnerability (CVE-2024-3094) and what you should do if your systems are at risk.
Vulnerabilities and Threats
7 Top Pentesting Tools for Automated & Manual Testing in 2026

7 Top Pentesting Tools for Automated & Manual Testing in 2026

Discover the latest in cybersecurity with 7 top pentesting tools for 2025. From automated to manual testing, empower your defenses with cutting-edge solutions.
Penetration testing
What is Vulnerability Scanning? + Key Techniques for Scanning

What is Vulnerability Scanning? + Key Techniques for Scanning

Find out everything you need to know to get started with vulnerability scanning and get the most out of your chosen product.
Vulnerability scanning
Guides
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.