Blog Read our latest news, research & expert advice on cyber security
Sign up for the Intruder Newsletter Intruder Ranked 38th Fastest Growing Technology Company in the UK in the 2023 Deloitte Technology Fast 50 Intruder has come 38th in Deloitte's Fast 50, which ranks the UK's 50 fastest growing tech companies.
read more Sign up for the Intruder Monthly Newsletter Windows vulnerability scanner 76% of desktops and 20% of servers run on Windows, so scanning for vulnerabilities of this huge attack surface is critical for most businesses today.
read more September 27, 2022
James Harrison
Product Update: Continuous Network Scanning We’re excited to announce more enhancements to our continuous network scanning with new features to Network View, continuous scanning and an even better UX.
read more September 16, 2021
Andy Hornegold
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708) Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
read more January 17, 2020
Daniel Andrew
How to secure the Kubernetes API behind a VPN Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
read more January 17, 2020
Lefteris Nikoltsios
Agent-Based vs Network-Based Internal Vulnerability Scanning Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
read more January 17, 2020
Chris Wallis
Hacking The Entire Internet Just Got Easier The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more January 17, 2020
Daniel Andrew
Penetration Testing vs Vulnerability Scanning What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
read more January 17, 2020
Daniel Andrew
Is Your Web Browser Secretly Mining Bitcoins? This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
read more January 17, 2020
Daniel Andrew
Intruder Ranked 38th Fastest Growing Technology Company in the UK in the 2023 Deloitte Technology Fast 50 Intruder has come 38th in Deloitte's Fast 50, which ranks the UK's 50 fastest growing tech companies.
read more Sign up for the Intruder Monthly Newsletter What is penetration testing? The ultimate guide We'll walk you through everything you need to know about penetration testing to power up your cyber security.
read more September 27, 2022
James Harrison
AWS Penetration Testing: A CTO's Guide Considering AWS penetration testing? There are many options available, and knowing what you need will help you make your security budget go as far as possible.
read more January 17, 2020
Chris Wallis
User Enumeration in Microsoft Products: An Incident Waiting to Happen? Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
read more January 17, 2020
Daniel Andrew
How much does penetration testing cost in 2023? Understand how penetration tests are quoted and find out what to look out for when choosing a vendor.
read more January 17, 2020
Daniel Andrew
Hacking The Entire Internet Just Got Easier The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more January 17, 2020
Daniel Andrew
Penetration Testing vs Vulnerability Scanning What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
read more January 17, 2020
Daniel Andrew
What is an Internal Pen Test? This time in our series on the different types of penetration test, we’re covering “Internal” pen tests, otherwise known as “Internal…
read more February 28, 2020
Lars Greiwe
What is a Penetration Test? This is the first article in a series explaining the different types of penetration testing — or “pen tests” for short. Because while many…
read more February 28, 2020
Lars Greiwe