Read the latest news from runZero.

Welcome to the newsroom! Explore the latest articles, announcements, media appearances, and press releases from runZero.

Media Mentions
AI drives new debate around CISA software patching deadlines
CISA this year has already started accelerating the deadlines for agencies to patch software bugs posted to the Known Exploited Vulnerabilities...
Article
20 Leaders Who Built the CISO Era: 2 Decades of Change
HD Moore, Founder and CEO of runZero, was selected as one of 20 industry figures who rewrote the enterprise risk playbook.
Media Mentions
A million baby monitors and security cameras were easily viewable by hackers
Meari Technology: the Wi-Fi camera maker you’ve probably never heard of. Tod Beardsley files five official CVE vulnerability reports.
Press Release
runZero Shatters the "Segmentation Illusion" with High-Fidelity OT Intelligence and Attack Path Mapping
New capabilities empower organizations to map the unmappable, visualize cross-environment attack paths, and validate segmentation across IT, OT,...
Media Mentions
Open source package with 1 million monthly downloads stole user credentials
If you’re one of millions using element-data, it’s time to check for compromise.
Article
The CVE Program, a bedrock of global cyber defense, is teetering on the brink
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.
Media Mentions
Your KVM is the weak link: How $30 devices can own your entire network
9 vulnerabilities across 4 vendors turn low-cost IP-KVMs into attack platforms.
Media Mentions
Researchers disclose vulnerabilities in IP KVMs from four manufacturers
Internet-exposed devices that give BIOS-level access? What could possibly go wrong?
Article
Q&A: Tod Beardsley on how to use CISA’s KEV catalog
Without context, the KEV catalog is just a very large collection of data. Tod Beardsley is the former CISA KEV section chief, and he recently...
Media Mentions
New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
That guest network you set up for your neighbors may not be as secure as you think.
Article
Don’t panic over CISA’s KEV list, use it smarter
Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how security teams...
Article
Trend analysis: intelligent vulnerability triage
The relentless deluge of digital threats has transformed the cybersecurity landscape into a constant battle of prioritization.