Customer Success Stories
See how companies benefit from using Intruder to protect their businesses

Sign up for the Intruder Newsletter
.jpg)
Types of penetration testing
If you are thinking about performing a penetration test on your organisation, you might be interested in learning about the different ...
read moreSign up for the Intruder Monthly Newsletter
.png)
Critical RDP Flaw Leaves up to 2.3 Million Servers Exposed (CVE-2019–0708)
Yesterday (May 14th 2019), Microsoft published a security advisory bulletin for a critical vulnerability in its remote login service…
read moreJanuary 17, 2020
Daniel Andrew

How to secure the Kubernetes API behind a VPN
Earlier this week, the first major vulnerability (CVE-2018–1002105) was discovered in Kubernetes, the container management platform taking…
read moreJanuary 17, 2020
Lefteris Nikoltsios

Agent-Based vs Network-Based Internal Vulnerability Scanning
Generally, when it comes to identifying and fixing vulnerabilities on your internal network, there are two competing (but not mutually…
read moreJanuary 17, 2020
Chris Wallis

Hacking The Entire Internet Just Got Easier
The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read moreJanuary 17, 2020
Daniel Andrew

Penetration Testing vs Vulnerability Scanning
What is the main difference between vulnerability scanning and penetration testing? People frequently confuse penetration testing and ...
read moreJanuary 17, 2020
Daniel Andrew

Is Your Web Browser Secretly Mining Bitcoins?
This week has seen the seemingly unstoppable surge of the cryptocurrency ‘Bitcoin’ hit over $10,000 for the first time. As private…
read moreJanuary 17, 2020
Daniel Andrew
.jpg)
Types of penetration testing
If you are thinking about performing a penetration test on your organisation, you might be interested in learning about the different ...
read moreSign up for the Intruder Monthly Newsletter

Penetration Testing your AWS environment - a CTO’s guide
So you’ve been thinking about getting a Penetration Test done on your AWS environment. Great! What should that involve exactly though? ...
read moreJanuary 17, 2020
Chris Wallis

User Enumeration in Microsoft Products: An Incident Waiting to Happen?
Intruder’s latest research reveals that up to 13,000 organisations are affected by little-known user enumeration flaws in a range of…
read moreJanuary 17, 2020
Daniel Andrew

How to Choose A Pentesting Company
We live in the age of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS…
read moreJanuary 17, 2020
Daniel Andrew

Hacking The Entire Internet Just Got Easier
The recent release of the new hacking tool ‘AutoSploit’ marks the dawn of a new era for unskilled attackers. It provides a fully-automated…
read moreJanuary 17, 2020
Daniel Andrew

Penetration Testing vs Vulnerability Scanning
What is the main difference between vulnerability scanning and penetration testing? People frequently confuse penetration testing and ...
read moreJanuary 17, 2020
Daniel Andrew

What is an Internal Pen Test?
This time in our series on the different types of penetration test, we’re covering “Internal” pen tests, otherwise known as “Internal…
read moreFebruary 28, 2020
Lars Greiwe

What is a Penetration Test?
This is the first article in a series explaining the different types of penetration testing — or “pen tests” for short. Because while many…
read moreFebruary 28, 2020
Lars Greiwe