-

Intruder Bolsters its Cloud Security Offerings with the Release of Container Image Scanning

New Capabilities Automatically Scan for Vulnerabilities to Provide Clear, Actionable Insights into Container Risk without Additional Setup or Configuration

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced the release of Container Image Scanning — a new upgrade to its cloud security capabilities that automatically scans container images for vulnerabilities, granting customers clear, actionable insight into container risk without deploying and maintaining scanning agents across their estates.

Leveraging existing integrations with major cloud providers, Intruder now supports Amazon Web Services Elastic Container Registry, Google Cloud Artifact Registry and Azure Container Registry. New images and updated versions are scanned daily for vulnerabilities, and users can view results in a single, prioritized list alongside other vulnerabilities, attack surface issues and misconfigurations detected by Intruder.

The update is available for all platform users across Cloud, Pro and Enterprise tiers as well as in the free trial. New customers will require additional setup when adding cloud integrations. Key benefits include:

  • No agents required: Using registry level integrations with cloud providers, customers won’t have the operational overhead associated with deploying agents to nodes, maintaining and debugging them.
  • Detection before execution: Unlike agent based approaches, registry level scanning allows customers to detect issues before the image runs in production.
  • Noise reduction: Rather than scanning every image in a registry, Intruder uses tags to focus on images that are actually in use across your cloud environments — cutting out noise from old, unused, or deprecated images and surfacing only the risks that matter.
  • Coverage across all environments: Agent-based configurations are commonly used in environments like Kubernetes, but containers are also used across many components in cloud infrastructures, such as Functions as a Service (AWS Lambdas), Containers as a Service (AWS ECS), or directly inside virtual machines that also need to be scanned to avoid risks.
  • Managed service image scanning: Coverage extends to images deployed to managed container services, where customers don't have access to the underlying nodes with those services and as a result, couldn’t previously deploy an agent.

Addressing A Common Exposure Gap in Modern Infrastructures

As part of the wider shift to cloud infrastructures, a large and growing proportion of digital workloads now occur on containerized, cloud-native platforms with the total market growing 33.5% per year (Grand View Research). However, those workloads face unique security challenges that leave them vulnerable.

Businesses building and deploying applications in containers often have limited visibility into vulnerabilities inside their container images. This means issues such as vulnerable open source packages, outdated dependencies, and known Common Vulnerabilities and Exposures (CVEs) are often left undetected. This leaves a major gap in attack surface coverage for modern, containerized environments. The problem is only growing worse as containerized infrastructure becomes more common while outdated, agent-based solutions are often complex to configure and maintain.

“Containerized environments are everywhere and security solutions need to adapt accordingly,” said Andy Hornegold, vice president of product at Intruder. “Containerized environments are a big, complicated attack surface and this release extends our attack surface and cloud coverage into one of the most critical parts of modern infrastructure, giving teams continuous visibility into container vulnerabilities with minimal effort and strong signal-to-noise control.”

Security and IT teams interested in learning more about the Intruder platform, its cloud security offerings and Container Image Scanning can book an introductory call here.

About Intruder

Intruder’s exposure management platform helps lean security teams stop breaches before they start by proactively discovering attack surface weaknesses. By unifying attack surface management, cloud security and continuous vulnerability management in one intuitive platform, Intruder makes it easy to stay secure by cutting through the noise and complexity. Founded in 2015 by Chris Wallis, a former ethical hacker turned corporate blue teamer, Intruder is now protecting over 3,000 companies worldwide. Learn more at https://intruder.io.

Q&A: Intruder Container Image Scanning Explained

What is the latest news from Intruder?

Intruder bolsters its cloud security capabilities with the release of Container Image Scanning. The platform now automatically scans container images across AWS ECR, Google Cloud Artifact Registry, and Azure Container Registry. New images and tagged versions are scanned continuously for vulnerabilities, with findings mapped into Intruder’s existing issue detection and prioritization workflow. This gives customers clear, actionable insight into container risk without additional setup or deploying and maintaining scanning agents across their estates.

What are the additional benefits of Container Image Scanning?

Intruder's Container Image Scanning automatically discovers images from AWS, Azure, and Google Cloud and continuously monitors the tags you choose, so you only see vulnerabilities in what's actually deployed — not every image ever pushed to your registry. It's fully agentless, using registry-level integrations that eliminate the overhead of deploying and maintaining agents, while extending coverage to managed services, serverless functions, and VMs where agents can't reach. Scanning detects issues before images run in production, with results prioritized by exploitability and severity, and automatic rescanning every 24 hours ensures new CVEs are caught fast.

What security concerns necessitate Container Image Scanning?

Businesses building and deploying applications in containers often have limited visibility into vulnerabilities inside their container images. This means issues such as vulnerable OS packages, outdated dependencies, and known CVEs are often left undetected. This ultimately leaves a major gap in attack surface coverage for modern, containerized environments.

The problem is only growing worse as containerized infrastructure becomes more common and outdated, and agent-based solutions are often complex to configure and maintain.

Who benefits the most from Intruder Container Image Scanning?

Mid-market and small enterprise companies operating cloud environments with containerized workloads on AWS, Google Cloud or Azure will benefit the most from the capabilities, as Intruder has integrations with all three of the major cloud providers.

Where is Container Image Scanning available?

The update is available for all platform users across Cloud, Pro and Enterprise tiers as well as in the free trial. The feature uses existing cloud integrations, with no additional configuration required for existing customers. New customers will need to add Cloud integrations upon signup.

Contacts

Press Contact
Treble
Jim Cameron
Intruder@treblepr.com

More News From Intruder

 Intruder Releases the Security Middle Child Report, Revealing How the Cybersecurity Industry Is Leaving Midmarket Businesses Behind

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today released its Security Middle Child Report, which uncovered that almost half of cybersecurity leaders at midmarket businesses, e.g. companies with at least $50M revenue and between 400-6000 employees, say they don’t have the right technology solutions, leaving them stuck in what Intruder calls the “security middle child problem." 46% say enterprise platforms assume more staff, budget, or complexity than they can support an...

Intruder Recognized as a 2026 G2 Best UK Software Company

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced it has been named to G2’s 2026 Best Software Awards, placing 40th on the Best UK Software Companies list out of over 3,000 total vendors. G2 users consistently praise Intruder’s product for its ease of use and intuitive interface. As the world’s largest and most trusted software marketplace, G2 reaches over 100 million buyers annually. Its annual Best Software Awards rank the world’s best software companies and...

Intruder Research Warns of Widespread Data Exposure Risks in Moltbot (Clawdbot) AI Assistant Deployments

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today released new security research detailing vulnerabilities in Moltbot, formerly known as Clawdbot, an open-source, self-hosted AI assistant. The research, “Clawdbot: When Easy AI Becomes a Security Nightmare,” finds that Moltbot’s emphasis on rapid, simplified deployment has created a significant and unintended attack surface. Intruder’s analysis shows that Moltbot is often deployed without baseline security protections, le...
Back to Newsroom