Updated Apr 23, 2026
Score 34
Intruder logo

Intruder

Ranked #286 of 1,000+ cybersecurity companies
Profile
INITIALIZING DATA STREAM...

Overview

Legal Name
Intruder Systems Ltd
Founded
2015
Crunchbase Rank
#7253

Use Intruder for real-time discovery and prioritization of attack surface weaknesses. Focus on the fixes that matter.

Intruder is a cloud-based vulnerability scanning platform, founded in 2015, that cuts through the noise to find and prioritize weaknesses in your external and digital (including cloud) infrastructure, integrates with cloud and development tools to alert teams in real time, and streamlines remediation by pushing issues to your trackers so you can focus on what matters.

Industries
Network Management SoftwareComputer and Network SecurityCybersecuritySaaSTMT
Type
Privately Held

Company Size

Employees
 
84
Range51–200 employees
110K+

Headquarters

1 Mark Square, Hoxton, Hackney, London, Ec2a 4eg, England, United Kingdom

Followers

 
5,813

Press Coverage

DateArticlePublisher
Nov 13, 2025Intruder Partners with DomainTools to Deliver Best-In-Class Attack Surface Discovery and Close the Visibility Gap on Organizations’ Full External PerimetersMorningstar.com
Nov 13, 2025Intruder Partners with DomainTools to Deliver Best-In-Class Attack Surface Discovery and Close the Visibility Gap on Organizations’ Full External PerimetersBusiness Wire
Nov 10, 2025As AI enables bad actors, how are 3,000+ teams responding?The Register
Nov 4, 2025Intruder Named Cloud Security Innovator in Latio’s 2025 Cloud Security Market ReportBusiness Wire
Oct 21, 2025Intruder’s 2025 Exposure Management Index: SMBs Face Rising Risk as AI Weaponizes Older CVEsBusiness Wire
Sep 23, 2025Intruder Cloud Security Now Supports Google Cloud PlatformMorningstar.com
Jul 29, 2025GregAI helps security teams fix real problems fasterBeta News
Jul 22, 2025Intruder Introduces Autoswagger: The Free Tool To Expose Hidden API Authorization FlawsBusiness Wire
Jul 22, 2025Free tool uncovers API vulnerabilitiesBeta News
Jun 10, 2025How to Build a Lean Security Model: 5 Lessons from River IslandThe Hacker News

1–10 of 23

Specialties

Information SecurityVulnerability ScanningCyber SecurityVulnerability ScannerAttack Surface ManagementCloud SecurityExposure Management

Categories

Cyber SecuritySoftware

Event Appearances

4 events · 1 sponsor · 3 exhibitor
TechDay London 2019
Oct 25, 2019·Exhibitor
DevSecCon London 2018
Oct 18, 2018·Sponsor
Pitch@palace 9.0
Apr 25, 2018·Exhibitor
Infosecurity Europe 2017
Jun 6, 2017·Exhibitor

Product

NameDescription
Attack Surface ManagementA platform to discover and monitor all internet-exposed assets including subdomains, APIs, login pages, and cloud services to maintain visibility of an organization's attack surface.
Cloud Vulnerability ScannerA cloud-based scanner that automatically discovers and scans internet-facing assets across AWS, Azure, and GCP for vulnerabilities and misconfigurations without requiring agents.
External Vulnerability ScannerA tool that scans external-facing systems such as web applications and network ports to identify security weaknesses and vulnerabilities accessible from the internet.
Exposure ManagementA service that combines multiple scanning engines and intelligence to detect over 1000 attack surface issues that other scanners may miss, focusing on exposures that increase breach risk.
Vulnerability PrioritizationA system that uses threat intelligence and machine learning scores to prioritize vulnerabilities beyond standard CVSS ratings, focusing on those most likely to be exploited.
IntegrationsConnects Intruder's platform with existing security, compliance, and IT tools for alerting, ticketing, and reporting to streamline vulnerability management workflows.