Read the latest news from runZero.

Welcome to the newsroom! Explore the latest articles, announcements, media appearances, and press releases from runZero.

Article
The CVE Program, a bedrock of global cyber defense, is teetering on the brink
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.
Media Mentions
Your KVM is the weak link: How $30 devices can own your entire network
9 vulnerabilities across 4 vendors turn low-cost IP-KVMs into attack platforms.
Media Mentions
Researchers disclose vulnerabilities in IP KVMs from four manufacturers
Internet-exposed devices that give BIOS-level access? What could possibly go wrong?
Article
Q&A: Tod Beardsley on how to use CISA’s KEV catalog
Without context, the KEV catalog is just a very large collection of data. Tod Beardsley is the former CISA KEV section chief, and he recently...
Media Mentions
New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
That guest network you set up for your neighbors may not be as secure as you think.
Article
Don’t panic over CISA’s KEV list, use it smarter
Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how security teams...
Article
Trend analysis: intelligent vulnerability triage
The relentless deluge of digital threats has transformed the cybersecurity landscape into a constant battle of prioritization.
Article
New paper and tool help security teams move beyond blind reliance on CISA’s KEV catalog
The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it.
Article
Researchers publish tool to enhance CISA KEV prioritization
A new paper offers an in-depth look at the CISA Known Exploited Vulnerability (KEV) catalog, providing a free tool to help security teams better...
Article
What CISA KEV is and isn’t – and a tool to help guide security teams
A new paper gives an insider’s perspective into CISA’s Known Exploited Vulnerability catalog – and also offers a free tool to help security teams...
Article
Data tool to triage exploited vulnerabilities can make KEV more useful
A disconnect exists between the organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple...
Article
Generational readiness, or lack thereof, in cybersecurity
Despite their tech-savviness, younger generations' preference for convenience creates security gaps that necessitate the more disciplined, cautious...