See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

How to use the KEV collider: A quick tour runZero Research

Layer signals and test filters to see risk indicators interact across the KEV catalog in real time. No install. No creds. Just open & start experimenting.

Subscribe Now

Get our latest Rapid Responses, insights, and blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

runZero Perspective
Our new year's resolution: forge a better path for vulnerability management
December 31, 2025
In this year-end blog post, HD Moore discusses why traditional vulnerability management is broken and how runZero is forging a better path forward.
Rapid Response
How to find MongoDB instances on your network
December 30, 2025
MongoDB disclosed an unauthenticated memory leak affecting multiple versions. Successful exploitation could lead to unauthorized information...
runZero Perspective
Fun podcast episodes of 2025 with HD Moore
December 22, 2025
From reverse-engineering Air Force software as a teen to redefining exposure management today, here's our favorite 2025 podcast appearances...
Rapid Response
How to find WatchGuard Firebox appliances on your network
December 19, 2025
WatchGuard has disclosed that certain versions of its Fireware OS are affected by an out-of-bounds write vulnerability in IKED.
Use Cases
Securing critical infrastructure in Australia: Operationalizing Cyber Shield 4
December 18, 2025
Ali Cheikh and Doug Markiewicz unpack Cyber Shield 4, the CIRMP mandate, and explains how runZero helps operationalize these requirements.
Rapid Response
How to find Cisco Secure Email Gateway assets on your network
December 17, 2025
Cisco has reported a vulnerability in their Secure Email Gateway product, allowing remote, unauthenticated attackers to execute arbitrary code.
Product
Vulnerability management: suppressions
December 15, 2025
runZero now supports suppressions for Findings, Vulnerability Groups, and individual Vulnerability instances, useful for filtering non-actionable...
Use Cases
Breaking down the DoD’s new zero trust guidance for OT systems
December 11, 2025
Learn how runZero can help you protect your OT environment, and help you align with the ZT for OT Activities and Outcomes guidance from the DoD.
Rapid Response
How to find Gogs installations on your network
December 10, 2025
Wiz has reported a vulnerability in Gogs, allowing remote, authenticated attackers to overwrite arbitrary files on the vulnerable system.
runZero Research
The runZero CNA is the newest CVE Numbering Authority!
December 10, 2025
runZero is now officially a CVE Numbering Authority!
Rapid Response
How to find Vercel Next.js instances on your network
December 5, 2025
A recently disclosed RCE vulnerability in React Server Components affects several React packages and dependent frameworks, including Next.js....
runZero Perspective
Our team’s favorite hacker toys of 2025
December 1, 2025
We asked our security researchers about their favorite hacker gadgets that spark their curiosity and inspire after-hours experimentation.