Intruder Integrates DomainTools to Enhance Attack Surface Discovery and Combat Shadow IT Risks

Intruder

Intruder has announced a strategic integration with DomainTools, leveraging the DNSDB—the world’s largest passive DNS database—to significantly expand its Attack Surface Management (ASM) capabilities. The upgrade equips Enterprise customers with enhanced visibility into their external networks, enabling automatic discovery and protection of previously unknown assets.

In a pilot program involving 60 Intruder customers, all participants saw an increase in the number of subdomains detected. Nearly half identified more than 10 additional subdomains, while almost a quarter uncovered over 50, with some large estates enumerating hundreds of thousands, and in one case over a million, related subdomains. These findings highlight the vast scale of enterprise attack surfaces and the critical need for automated discovery tools.

“Incorporating DomainTools data into Intruder’s offering is more than just a new advantage for our customers to secure their external perimeters with confidence but an important step in our company’s philosophy,” said Andy Hornegold, Vice President of Product at Intruder. “Building platforms that handle multiple relevant functions and equip teams to quickly close their vulnerability gaps is far more effective than manual processes or integrations between disparate point solutions.”

Also Read: Accenture and Snowflake Launch Joint Business Group to Accelerate Enterprise AI

The integration uses Passive DNS (pDNS) data to complement existing capabilities based on certificate transparency and active DNS data. By automatically finding and securing unmonitored subdomains, security teams can tackle threats from Shadow IT. These systems are developed without IT oversight and can be hidden from view. If unprotected, they can create vulnerabilities for attackers.

Intruder’s enhanced ASM platform helps organizations list subdomains, run vulnerability scans, and protect previously unseen assets. This allows IT and security teams to lower risk and maintain control over complex network infrastructures.

This integration shows Intruder’s commitment to security solutions that simplify protection in large, dynamic enterprises. It also addresses the complex threats linked to Shadow IT.