Tag: Intruder
-
FTC schools edtech outfit after intruder walked off with 10M student records
Regulator says Illuminate ignored years of warnings, stored kids’ data in plain text, and kept districts in the dark First seen on theregister.com Jump to article: www.theregister.com/2025/12/02/ftc_illuminate/
-
FTC schools edtech outfit after intruder walked off with 10M student records
Regulator says Illuminate ignored years of warnings, stored kids’ data in plain text, and kept districts in the dark First seen on theregister.com Jump to article: www.theregister.com/2025/12/02/ftc_illuminate/
-
As AI enables bad actors, how are 3,000+ teams responding?
Breaking down trends in exposure management with insights from 3,000+ organizations and Intruder’s security experts First seen on theregister.com Jump to article: www.theregister.com/2025/11/10/ai_enables_bad_actors/
-
The State of Exposure Management in 2025: Insights From 3,000+ Organizations
Attackers are using AI to weaponize old vulnerabilities while security teams face expanding attack surfaces and limited resources. Intruder’s 2025 Exposure Management Index reveals how 3,000+ organizations are adapting and fixing critical flaws faster than ever. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-state-of-exposure-management-in-2025-insights-from-3-000-plus-organizations/
-
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws
Tags: access, attack, authentication, breach, china, control, corporate, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, flaw, framework, government, group, hacker, identity, infrastructure, intelligence, Intruder, korea, microsoft, monitoring, network, ransomware, reverse-engineering, risk, russia, supply-chain, tactics, technology, theft, threat, vulnerability, zero-day, zero-trustChina or Russia? Conflicting attribution: Microsoft attributed the broader wave of SharePoint exploitations to three Chinese-linked groups: Linen Typhoon, Violet Typhoon, and a third actor it tracks as Storm-2603. The company said the attackers were preparing to deploy Warlock ransomware across affected systems.However, the source familiar with the Kansas City incident tells CSO that a…
-
Meet ARGUS, the robot built to catch hackers and physical intruders
Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/06/argus-robotic-security-system/
-
Meet ARGUS, the robot built to catch hackers and physical intruders
Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/06/argus-robotic-security-system/
-
Red Hat fesses up to GitLab breach after attackers brag of data theft
Open source giant admits intruders broke into dedicated consulting instance, but insists core products untouched First seen on theregister.com Jump to article: www.theregister.com/2025/10/03/red_hat_gitlab_breach/
-
Can We Trust AI To Write Vulnerability Checks? Here’s What We Found
Can AI speed up writing vulnerability checks without sacrificing quality? Intruder put it to the test. Their researchers found where AI helps, where it falls short, and why human oversight is still critical. See what they discovered in practice. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/can-we-trust-ai-to-write-vulnerability-checks-heres-what-we-found/
-
Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign
Not to be confused with all the other reports of Chinese intruders on US networks that came to light this week First seen on theregister.com Jump to article: www.theregister.com/2025/09/27/rednovember_chinese_espionage/
-
CISA Reveals Hackers Breached U.S. Federal Agency via GeoServer RCE Flaw
Tags: access, breach, cisa, cyber, cybersecurity, detection, endpoint, exploit, flaw, hacker, incident response, Intruder, rce, remote-code-execution, vulnerabilityFederal cybersecurity agency CISA has disclosed that attackers exploited a remote code execution vulnerability in GeoServer to breach a U.S. federal civilian executive branch agency. The incident response began after endpoint detection alerts sounded at the agency. Over three weeks, cyber intruders used the flaw to gain initial access, move laterally, and establish persistence across…
-
From prevention to rapid response: The new era of CISO strategy
Tags: access, attack, authentication, automation, awareness, breach, ciso, control, credentials, cybersecurity, data, finance, fintech, infrastructure, Intruder, malicious, monitoring, network, privacy, radius, resilience, service, strategy, threat, zero-trustBreaches will happen, so how do we deal with the fallout?CISOs are now spending less energy trying to keep every threat at bay. They know attackers will get in, but the question is, what’s next? The new mindset is about stopping intruders from moving around and escalating the damage.This shift means investing in sharper visibility,…
-
Black Hat Fireside Chat: API sprawl turns SMBs into prime targets, simple flaws invite breaches
Cyber attackers don’t always need sophisticated exploits. Too often, they succeed by exploiting the basics. Related: 51 common SMB cyberattacks That’s the warning from Chris Wallis, founder and CEO of London-based Intruder, who sat down with Last Watchdog“¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/black-hat-fireside-chat-api-sprawl-turns-smbs-into-prime-targets-simple-flaws-invite-breaches/
-
Black Hat Fireside Chat: API sprawl turns SMBs into prime targets, simple flaws invite breaches
Cyber attackers don’t always need sophisticated exploits. Too often, they succeed by exploiting the basics. Related: 51 common SMB cyberattacks That’s the warning from Chris Wallis, founder and CEO of London-based Intruder, who sat down with Last Watchdog“¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/black-hat-fireside-chat-api-sprawl-turns-smbs-into-prime-targets-simple-flaws-invite-breaches/
-
Black Hat Fireside Chat: API sprawl turns SMBs into prime targets, simple flaws invite breaches
Cyber attackers don’t always need sophisticated exploits. Too often, they succeed by exploiting the basics. Related: 51 common SMB cyberattacks That’s the warning from Chris Wallis, founder and CEO of London-based Intruder, who sat down with Last Watchdog“¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/black-hat-fireside-chat-api-sprawl-turns-smbs-into-prime-targets-simple-flaws-invite-breaches/
-
Shadow IT Is Expanding Your Attack Surface. Here’s Proof
Shadow IT isn’t theoretical”, it’s everywhere. Intruder uncovered exposed backups, open Git repos, and admin panels in just days, all hiding sensitive data. Make your hidden assets visible before attackers do. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/shadow-it-is-expanding-your-attack-surface-heres-proof/
-
The intruder is in the house: Storm-0501 attacked Azure, stole data, demanded payment via Teams
Don’t let it happen to you First seen on theregister.com Jump to article: www.theregister.com/2025/08/27/storm0501_ransomware_azure_teams/
-
Like burglars closing a door, Apache ActiveMQ attackers patch critical vuln after breaking in
Intruders hoped no one would notice their presence First seen on theregister.com Jump to article: www.theregister.com/2025/08/19/apache_activemq_patch_malware/
-
Free Autoswagger Tool Finds the API Flaws Attackers Hope You Miss
Exposed API documentation is a gift-wrapped roadmap for threat actors. The free Autoswagger tool from Intruder scans for exposed docs and flags endpoints with broken access controls”, before attackers find them. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/free-tool-autoswagger-finds-the-api-flaws-attackers-hope-you-miss/
-
Free Tool Autoswagger Finds The API Flaws Attackers Hope You Miss
Exposed API documentation is a gift-wrapped roadmap for threat actors. The free Autoswagger tool from Intruder scans for exposed docs and flags endpoints with broken access controls”, before attackers find them. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/free-tool-autoswagger-finds-the-api-flaws-attackers-hope-you-miss/
-
Intruder Open Sources Tool for Testing API Security
Intruder this week made available an open-source tool that scans application programming interfaces (APIs) for broken authorization vulnerabilities. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/intruder-open-sources-tool-for-testing-api-security/
-
$380M lawsuit claims intruder got Clorox’s passwords from Cognizant simply by asking
Hand us the mind bleach, we want to flush our memories of attack First seen on theregister.com Jump to article: www.theregister.com/2025/07/23/lawsuit_clorox_vs_cognizant/
-
SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit
Unknown intruders are targeting fully patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances and deploying a novel, persistent backdoor / rootkit, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/16/sonicwall-sma-devices-persistently-infected-with-stealthy-overstep-backdoor-rootkit/
-
CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn
Intruders looked up how to use curl mid-attack – rookie errors kept damage minimal First seen on theregister.com Jump to article: www.theregister.com/2025/07/11/1010_wing_ftp_bug_exploited/
-
Ahold Delhaize USA says cyberattack exposed personal data of 2M people
The intruders who gained access to the grocer’s online systems in November had access to information including birthdays, Social Security numbers and bank account details. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ahold-delhaize-usa-cyberattack-grocery-personal-data-exposed/752053/
-
CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Tags: access, automation, breach, business, cisco, ciso, crowdstrike, cybercrime, cybersecurity, data, defense, finance, incident response, Intruder, okta, ransomware, siem, technology, threatThreat actor containment: Increasingly ‘surgical’ and best with a plan: Even after an intruder has been identified, today’s rapid pace of adversary activity is also straining cybersecurity teams’ ability to contain intruders before they can cause damage.”If I’m a CISO, if I’m responsible for detecting and remediating that incident before it progresses to becoming a…
-
Companies Must Get Their Cybersecurity In Hand, Intruders May Be Watching.
First seen on scworld.com Jump to article: www.scworld.com/perspective/companies-must-get-their-cybersecurity-in-hand-intruders-may-be-watching
-
Let them eat junk food: Major organic supplier to Whole Foods, Walmart, hit by cyberattack
United Natural Foods shut down some of its systems on June 5 after spotting network intruders First seen on theregister.com Jump to article: www.theregister.com/2025/06/09/united_natural_foods_cyber_incident/

