Blog Read our latest news, research & expert advice on cyber security
Sign up for the Intruder Newsletter Reality check: How will generative AI really impact cyber security? Chris Wallis explores how the technology could be deployed in security contexts.
read more Sign up for the Intruder Monthly Newsletter Agent-Based vs Network-Based Internal Vulnerability Scanning Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
read more January 17, 2020
Chris Wallis
Hacking The Entire Internet Just Got Easier The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more January 17, 2020
Daniel Andrew
Penetration Testing vs Vulnerability Scanning What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
read more January 17, 2020
Daniel Andrew
Is Your Web Browser Secretly Mining Bitcoins? This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
read more January 17, 2020
Daniel Andrew
Reality check: How will generative AI really impact cyber security? Chris Wallis explores how the technology could be deployed in security contexts.
read more Sign up for the Intruder Monthly Newsletter AWS Penetration Testing: A CTO's Guide Considering AWS penetration testing? There are many options available, and knowing what you need will help you make your security budget go as far as possible.
read more January 17, 2020
Chris Wallis
User Enumeration in Microsoft Products: An Incident Waiting to Happen? Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
read more January 17, 2020
Daniel Andrew
How much does a penetration test cost & how to choose a vendor? Understand how penetration tests are quoted and find out what to look out for when choosing a vendor.
read more January 17, 2020
Daniel Andrew
Hacking The Entire Internet Just Got Easier The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more January 17, 2020
Daniel Andrew
Penetration Testing vs Vulnerability Scanning What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
read more January 17, 2020
Daniel Andrew
What is an Internal Pen Test? This time in our series on the different types of penetration test, we’re covering “Internal” pen tests, otherwise known as “Internal…
read more February 28, 2020
Lars Greiwe
What is a Penetration Test? This is the first article in a series explaining the different types of penetration testing — or “pen tests” for short. Because while many…
read more February 28, 2020
Lars Greiwe