<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet href="/pretty-atom.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <id>https://www.intruder.io/blog</id>
    <title>Intruder Blog</title>
    <updated>2026-04-12T12:16:52.628Z</updated>
    <generator>RSS-O-Matic</generator>
    <link rel="alternate" href="https://www.intruder.io/blog"/>
    <link rel="self" href="https://rss-o-matic.com/feed/HAjnD6BZwiot.atom"/>
    <subtitle>Generated by RSS-O-Matic — rss-o-matic.com</subtitle>
    <icon>https://rss-o-matic.com/favicon.svg</icon>
    <entry>
        <title type="html"><![CDATA[The cloud isn't secure by default: what containers changed about risk]]></title>
        <id>https://www.intruder.io/blog/the-cloud-isnt-secure-by-default-what-containers-changed-about-risk</id>
        <link href="https://www.intruder.io/blog/the-cloud-isnt-secure-by-default-what-containers-changed-about-risk"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69c298f12159ca3b35c54f01_Container%20image%20scanning%20blog%203%20-%20Blog%20header.png" type="image/png"/>
        <updated>2026-03-24T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what]]></summary>
        <author>
            <name>Charlie Yianni</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Overconfident and under resourced: navigating the midmarket security gap]]></title>
        <id>https://www.intruder.io/blog/midmarket-security-gap-middle-child</id>
        <link href="https://www.intruder.io/blog/midmarket-security-gap-middle-child"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69c27fdd0b860803a193a9fc_The%20security%20middle%20child_Blog%20thumbnail.png" type="image/png"/>
        <updated>2026-03-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.]]></summary>
        <author>
            <name>Olya Osiagina</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Registry vs. runtime: where to scan your container images]]></title>
        <id>https://www.intruder.io/blog/registry-vs-runtime-where-to-scan-your-container-images</id>
        <link href="https://www.intruder.io/blog/registry-vs-runtime-where-to-scan-your-container-images"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69b933774793af2fab314088_Container%20Security%20Blog%202%20-%20Blog%20Header.png" type="image/png"/>
        <updated>2026-03-19T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea]]></summary>
        <author>
            <name>Manuel Morejon</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Vulnerabulletin Issue #5]]></title>
        <id>https://www.intruder.io/blog/the-vulnerabulletin-issue-5</id>
        <link href="https://www.intruder.io/blog/the-vulnerabulletin-issue-5"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/696f99a66aea8945b40e5bcf_Profile%20image%20for%20Linkedin%20Newsletter%20section.jpg" type="image/jpg"/>
        <updated>2026-03-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.]]></summary>
        <author>
            <name>Dann Moore</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Vulnerabulletin Issue #4]]></title>
        <id>https://www.intruder.io/blog/the-vulnerabulletin-issue-4</id>
        <link href="https://www.intruder.io/blog/the-vulnerabulletin-issue-4"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/696f99a66aea8945b40e5bcf_Profile%20image%20for%20Linkedin%20Newsletter%20section.jpg" type="image/jpg"/>
        <updated>2026-02-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.]]></summary>
        <author>
            <name>Dann Moore</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Beyond Compliance: What Actually Builds Customer Trust]]></title>
        <id>https://www.intruder.io/blog/compliance-frameworks-customer-trust</id>
        <link href="https://www.intruder.io/blog/compliance-frameworks-customer-trust"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/698dc1d196e58a4ac7fcff73_Guest%20blog%20image.jpg" type="image/jpg"/>
        <updated>2026-02-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Compliance frameworks help you pass an audit; continuous compliance helps you keep customer confidence.]]></summary>
        <author>
            <name>Ashley Hyman</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[From enterprise chatbots to gooner caves: exposed AI infrastructure is rampant]]></title>
        <id>https://www.intruder.io/research/from-enterprise-chatbots-to-gooner-caves-exposed-ai-infrastructure-is-rampant</id>
        <link href="https://www.intruder.io/research/from-enterprise-chatbots-to-gooner-caves-exposed-ai-infrastructure-is-rampant"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69c65f5be3fdb1d002c176a3_%5Bblog%5D%20From%20Enterprise%20ChatBots%20To%20Gooner%20Caves%2C%20Scanning%20The%20Internet%20For%20Exposed%20LLM%20Infra.png" type="image/png"/>
        <updated>2026-03-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[We scanned 1 million AI services and found widespread misconfigurations, exposed credentials, and unauthenticated APIs. AI infrastructure security is falling dangerously behind.]]></summary>
        <author>
            <name>Benjamin Marr</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Secrets in your Bundle(.js) - The Gift Attackers Always Wanted]]></title>
        <id>https://www.intruder.io/research/secrets-detection-javascript</id>
        <link href="https://www.intruder.io/research/secrets-detection-javascript"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/693165ea2fb1457030baa3c4_2025%20-%20Secret%20Detection%20for%20Intruder%20blog.png" type="image/png"/>
        <updated>2025-12-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Our scan of 5M apps uncovered 42k+ tokens in JavaScript bundles, from code repo tokens to project management API keys. Learn why traditional scanners miss them, and how Intruder’s new secrets detection method catches what others can’t.]]></summary>
        <author>
            <name>Benjamin Marr</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[AI Vibe Coding: When Convenience Turns Into a Security Liability]]></title>
        <id>https://www.intruder.io/research/vibe-coding-security-risks</id>
        <link href="https://www.intruder.io/research/vibe-coding-security-risks"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/690dd8e42fb2ce7bce253273_Intruder%20blog.png" type="image/png"/>
        <updated>2025-12-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[When we used AI to help code a honeypot, it introduced a vulnerability of its own. What transpired was a fascinating, if uncomfortable, lesson in AI complacency - how easily trust in automation can make us miss what’s right in front of us. We share what we learned and what it means for anyone using AI to code.]]></summary>
        <author>
            <name>Sam Pizzey</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[9 best DevSecOps tools for 2026]]></title>
        <id>https://www.intruder.io/blog/devsecops-tools</id>
        <link href="https://www.intruder.io/blog/devsecops-tools"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/64133b614d23552223a09820_Top%20pentesting%20tools%20hero.webp" type="image/webp"/>
        <updated>2023-11-29T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[DevSecOps tools help identify security vulnerabilities early in your development process. Explore our list of the best tools for 2025.]]></summary>
        <author>
            <name>Christian Gonzalez</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[AWS Cloud Security Explained: What’s Left Exposed?]]></title>
        <id>https://www.intruder.io/blog/aws-cloud-security-explained-whats-left-exposed</id>
        <link href="https://www.intruder.io/blog/aws-cloud-security-explained-whats-left-exposed"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/67dbdf5d4edcf87c33d02d6f_AWS-Cloud-Security.png" type="image/png"/>
        <updated>2025-03-20T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.]]></summary>
        <author>
            <name>Daniel Andrew</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[AWS Security Services: What They Do and Don’t Do]]></title>
        <id>https://www.intruder.io/blog/aws-security-services</id>
        <link href="https://www.intruder.io/blog/aws-security-services"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/67c981932482bef9561deb39_AWS-Security-Tools.jpg" type="image/jpg"/>
        <updated>2025-03-06T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.]]></summary>
        <author>
            <name>Daniel Andrew</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Vulnerabulletin Issue #5]]></title>
        <id>https://www.intruder.io/blog/the-vulnerabulletin-issue-5</id>
        <link href="https://www.intruder.io/blog/the-vulnerabulletin-issue-5"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/696f99a66aea8945b40e5bcf_Profile%20image%20for%20Linkedin%20Newsletter%20section.jpg" type="image/jpg"/>
        <updated>2026-03-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.]]></summary>
        <author>
            <name>Dann Moore</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Introducing container image scanning: no agents, no blind spots]]></title>
        <id>https://www.intruder.io/blog/introducing-container-image-scanning-no-agents--no-blind-spots</id>
        <link href="https://www.intruder.io/blog/introducing-container-image-scanning-no-agents--no-blind-spots"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69ce4937e3c4ed9b5d751e3e_%5Bblog%5D%20Container%20Image%20Scanning.png" type="image/png"/>
        <updated>2026-04-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.]]></summary>
        <author>
            <name>Eamon Carroll</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Vulnerabulletin Issue #4]]></title>
        <id>https://www.intruder.io/blog/the-vulnerabulletin-issue-4</id>
        <link href="https://www.intruder.io/blog/the-vulnerabulletin-issue-4"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/696f99a66aea8945b40e5bcf_Profile%20image%20for%20Linkedin%20Newsletter%20section.jpg" type="image/jpg"/>
        <updated>2026-02-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.]]></summary>
        <author>
            <name>Dann Moore</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Introducing container image scanning: no agents, no blind spots]]></title>
        <id>https://www.intruder.io/blog/introducing-container-image-scanning-no-agents--no-blind-spots</id>
        <link href="https://www.intruder.io/blog/introducing-container-image-scanning-no-agents--no-blind-spots"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69ce4937e3c4ed9b5d751e3e_%5Bblog%5D%20Container%20Image%20Scanning.png" type="image/png"/>
        <updated>2026-04-09T00:00:00.000Z</updated>
        <author>
            <name>Eamon Carroll</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The cloud isn't secure by default: what containers changed about risk]]></title>
        <id>https://www.intruder.io/blog/the-cloud-isnt-secure-by-default-what-containers-changed-about-risk</id>
        <link href="https://www.intruder.io/blog/the-cloud-isnt-secure-by-default-what-containers-changed-about-risk"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69c298f12159ca3b35c54f01_Container%20image%20scanning%20blog%203%20-%20Blog%20header.png" type="image/png"/>
        <updated>2026-03-24T00:00:00.000Z</updated>
        <author>
            <name>Charlie Yianni</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Overconfident and under resourced: navigating the midmarket security gap]]></title>
        <id>https://www.intruder.io/blog/midmarket-security-gap-middle-child</id>
        <link href="https://www.intruder.io/blog/midmarket-security-gap-middle-child"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69c27fdd0b860803a193a9fc_The%20security%20middle%20child_Blog%20thumbnail.png" type="image/png"/>
        <updated>2026-03-23T00:00:00.000Z</updated>
        <author>
            <name>Olya Osiagina</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Registry vs. runtime: where to scan your container images]]></title>
        <id>https://www.intruder.io/blog/registry-vs-runtime-where-to-scan-your-container-images</id>
        <link href="https://www.intruder.io/blog/registry-vs-runtime-where-to-scan-your-container-images"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/69b933774793af2fab314088_Container%20Security%20Blog%202%20-%20Blog%20Header.png" type="image/png"/>
        <updated>2026-03-19T00:00:00.000Z</updated>
        <author>
            <name>Manuel Morejon</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Vulnerabulletin Issue #5]]></title>
        <id>https://www.intruder.io/blog/the-vulnerabulletin-issue-5</id>
        <link href="https://www.intruder.io/blog/the-vulnerabulletin-issue-5"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/696f99a66aea8945b40e5bcf_Profile%20image%20for%20Linkedin%20Newsletter%20section.jpg" type="image/jpg"/>
        <updated>2026-03-18T00:00:00.000Z</updated>
        <author>
            <name>Dann Moore</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Why attack surface reduction is your first line of defense]]></title>
        <id>https://www.intruder.io/blog/why-attack-surface-reduction-is-your-first-line-of-defense</id>
        <link href="https://www.intruder.io/blog/why-attack-surface-reduction-is-your-first-line-of-defense"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/699ef78c069da55027c2fee7_2026%20-%20Blog%20-%20Proactive%20ASR%20blog%20header.png" type="image/png"/>
        <updated>2026-03-03T00:00:00.000Z</updated>
        <author>
            <name>Daniel Andrew</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Vulnerabulletin Issue #4]]></title>
        <id>https://www.intruder.io/blog/the-vulnerabulletin-issue-4</id>
        <link href="https://www.intruder.io/blog/the-vulnerabulletin-issue-4"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/696f99a66aea8945b40e5bcf_Profile%20image%20for%20Linkedin%20Newsletter%20section.jpg" type="image/jpg"/>
        <updated>2026-02-18T00:00:00.000Z</updated>
        <author>
            <name>Dann Moore</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Beyond Compliance: What Actually Builds Customer Trust]]></title>
        <id>https://www.intruder.io/blog/compliance-frameworks-customer-trust</id>
        <link href="https://www.intruder.io/blog/compliance-frameworks-customer-trust"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/698dc1d196e58a4ac7fcff73_Guest%20blog%20image.jpg" type="image/jpg"/>
        <updated>2026-02-18T00:00:00.000Z</updated>
        <author>
            <name>Ashley Hyman</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[Building a Secure Container Registry Strategy]]></title>
        <id>https://www.intruder.io/blog/container-registry-security</id>
        <link href="https://www.intruder.io/blog/container-registry-security"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/698a04a1f4241e56a584403b_2026%20-%20Blog%20header_Container%20Security.jpg" type="image/jpg"/>
        <updated>2026-02-09T00:00:00.000Z</updated>
        <author>
            <name>Manuel Morejon</name>
        </author>
    </entry>
    <entry>
        <title type="html"><![CDATA[19 Cyber Leaders to Follow on LinkedIn (and Why They Deserve Your Attention)]]></title>
        <id>https://www.intruder.io/blog/20-cyber-leaders-to-follow-on-linkedin</id>
        <link href="https://www.intruder.io/blog/20-cyber-leaders-to-follow-on-linkedin"/>
        <link rel="enclosure" href="https://cdn.prod.website-files.com/61dd9339d05701829d0b3241/697b61cea68b585a0b10016a_2026%20-%20Blog%20header%20-%20Top%20leaders%20to%20follow%20on%20linkedin.svg" type="image/svg"/>
        <updated>2026-02-05T00:00:00.000Z</updated>
        <author>
            <name>Eamon Carroll</name>
        </author>
    </entry>
</feed>