See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

runZero Findings feature for CISA BOD 26-02 Use Cases

runZero users can now enjoy a consistent, clear way to track what CISA (and we) believe are some of the most critically exposed assets on your network.

Subscribe Now

Get our latest Rapid Responses, insights, and blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Use Cases
How to optimize runZero scanning for global networks
February 26, 2026
Enterprise networks are complex. In this guide, we show how to optimize runZero for large-scale deployments using a hypothetical retail enterprise...
Rapid Response
How to find Cisco Catalyst SD-WAN installations on your network
February 25, 2026
Cisco disclosed versions of Cisco Catalyst SD-WAN Controller & Manager contain a vulnerability in the peering auth mechanism. How to find affected...
Rapid Response
How to find Roundcube Webmail on your network
February 20, 2026
A Roundcube Webmail vulnerability would allow a remote, authenticated attacker to perform RCE due to deserialization of untrusted data.
Rapid Response
How to find Grandstream VoIP phones on your network
February 19, 2026
Security researchers at Rapid7 reported a stack-based buffer overflow vulnerability that allows remote root RCE. Here's how to find affected assets.
Use Cases
CISA BOD 26-02, EOS, and runZero
February 19, 2026
CISA is keeping its EOS device list under wraps. Our resident former fed breaks down BOD 26-02 and shares a runZero query to help you find your...
Rapid Response
How to find Dell RecoverPoint installations on your network
February 18, 2026
Dell disclosed certain versions of Dell RecoverPoint for Virtual Machines contain a hardcoded credential vulnerability. Here's how to find affected...
Rapid Response
How to find SolarWinds Web Help Desk services on your network
February 13, 2026
SolarWinds has disclosed multiple vulnerabilities affecting certain versions of WHD: CVE-2025-40551, CVE-2025-40552, CVE-2025-40553,...
runZero Research
How to use the KEV collider: A quick tour
February 12, 2026
Layer signals and test filters to see risk indicators interact across the KEV catalog in real time. No install. No creds. Just open & start...
Rapid Response
How to find BeyondTrust appliances on your network
February 8, 2026
BeyondTrust has disclosed a pre-authentication RCE vulnerability affecting certain versions of both RS and PRA. Here's how to find impacted assets.
Use Cases
How runZero helps agencies meet CISA BOD 26-02 compliance
February 6, 2026
Achieve total visibility and BOD 26-02 compliance. Discover every asset, validate your edge, and surface EOL/EOS risks in minutes. Start your free...
runZero Research
Making the CISA KEV actionable for real-world risk
February 5, 2026
If you want to understand what the KEV is actually telling you, read our new KEVology report, then take the analysis into the lab with the KEV...
Rapid Response
How to find Kubernetes Ingress-NGINX Controller installations on your network
February 3, 2026
Kubernetes disclosed multiple vulnerabilities in their Ingress-NGINX controller. Here's how to find Ingress-NGINX controller installations on your...