AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Clear all filters
Apache Struts — Remote Code Execution — CVE-2017–5638

Apache Struts — Remote Code Execution — CVE-2017–5638

On March 7th a critical vulnerability was announced in the Apache Struts framework, a popular web development toolkit that is commonly used…
Vulnerabilities and Threats
200,000 websites still affected by three year old security weakness (Heartbleed)

200,000 websites still affected by three year old security weakness (Heartbleed)

The Heartbleed vulnerability, renowned for allowing hackers anywhere on the internet to access encrypted communication between websites and…
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities

Intruder Vulnerability Bulletin — PHPMailer, SwiftMailer & ZendFramework Code Execution Vulnerabilities

A number of vulnerabilities were recently discovered, which affect email sending functionality in the following software libraries:
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability

Intruder Vulnerability Bulletin — PHPMailer Code Execution Vulnerability

A vulnerability in the PHPMailer library was recently discovered, which affects versions of the software before 5.2.18.
Vulnerabilities and Threats
Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin

Memcached Code Execution Vulnerabilities — Intruder Vulnerability Bulletin

A number of new vulnerabilities in Memcached were recently discovered, which affect versions of the software before 1.4.33.
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — Dirty COW Privilege Escalation

Intruder Vulnerability Bulletin — Dirty COW Privilege Escalation

You may have heard of a new Linux vulnerability named “Dirty COW” in the news today.
Vulnerabilities and Threats
The battle for IoT Security has already been lost

The battle for IoT Security has already been lost

A few weeks ago, the website of popular cyber security journalist Brian Krebs was taken offline by a previously undiscovered botnet, now…
Insights
Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)

Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)

Leaked from the NSA’s toolkit of private exploits, this recently disclosed Heartbleed-esque vulnerability can allow an attacker anywhere on…
Vulnerabilities and Threats
Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities

Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities

You may have heard of two new MySQL vulnerabilities in the news over the past couple of days (CVE-2016–6662 & CVE-2016–6663).
Vulnerabilities and Threats
What’s the point in phishing assessments?

What’s the point in phishing assessments?

As news is released that PhishMe made £45 million last year, it’s clear that phishing assessments have become very popular. But it begs the…
Insights
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.