Customer Success Stories

See how companies benefit from using Intruder to protect their businesses
All
Filter 1
Filters 2
No items found.
Latest

Vulnerability Scanning Frequency Best Practices

So you’ve decided to set up a vulnerability scanning programme, great. That’s one of the best ways to avoid data breaches. How often you...
read more
January 17, 2020
Chris Wallis

Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)

Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
read more
January 17, 2020
Daniel Andrew

How to secure the Kubernetes API behind a VPN

Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
read more
January 17, 2020
Lefteris Nikoltsios

Agent-Based vs Network-Based Internal Vulnerability Scanning

Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
read more
January 17, 2020
Chris Wallis

Hacking The Entire Internet Just Got Easier

The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more
January 17, 2020
Daniel Andrew

Penetration Testing vs Vulnerability Scanning

What’s better, one-off pen-testing, or regular vulnerability scanning? Penetration tests have long been an essential part of many...
read more
January 17, 2020
Daniel Andrew

Is Your Web Browser Secretly Mining Bitcoins?

This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
read more
January 17, 2020
Daniel Andrew
Latest

Vulnerability Scanning Frequency Best Practices

So you’ve decided to set up a vulnerability scanning programme, great. That’s one of the best ways to avoid data breaches. How often you...
read more
January 17, 2020
Chris Wallis

Penetration Testing your AWS environment - a CTO’s guide

So you’ve been thinking about getting a Penetration Test done on your AWS environment. Great! What should that involve exactly though? ...
read more
January 17, 2020
Chris Wallis

User Enumeration in Microsoft Products: An Incident Waiting to Happen?

Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
read more
January 17, 2020
Daniel Andrew

How to Choose A Pentesting Company

We live in the age of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS…
read more
January 17, 2020
Daniel Andrew

Hacking The Entire Internet Just Got Easier

The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read more
January 17, 2020
Daniel Andrew

Penetration Testing vs Vulnerability Scanning

What’s better, one-off pen-testing, or regular vulnerability scanning? Penetration tests have long been an essential part of many...
read more
January 17, 2020
Daniel Andrew

What is an Internal Pen Test?

This time in our series on the different types of penetration test, we’re covering “Internal” pen tests, otherwise known as “Internal…
read more
February 28, 2020
Lars Greiwe

What is a Penetration Test?

This is the first article in a series explaining the different types of penetration testing — or “pen tests” for short. Because while many…
read more
February 28, 2020
Lars Greiwe

Ready to get started with your 30-day trial?

try for free
BACK TO TOP