See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

How to find systems impacted by CVE-2024-3094 (XZ Utils backdoor) Rapid Response

Malicious code was pushed to the libxz-utils project that introduced a backdoor in SSH. Here's how to find potentially vulnerable systems.

Subscribe Now

Get our latest Rapid Responses, insights, & blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Rapid Response
How to find Ivanti EPMM (MobileIron Core)
July 31, 2023
On July 24th, Ivanti announced that their Endpoint Manager Mobile (EPMM, formerly MobileIron Core) product versions 11.10 and prior contain a...
The cybersecurity tools inefficient for CAASM
July 26, 2023
Each article in this roundup explains the downsides of common tools as they pertain as effective CAASM solutions, and how runZero, a complete CAASM...
Rapid Response
How to find Citrix NetScaler ADCs and Gateways
July 21, 2023
Earlier this week, Citrix alerted customers to three vulnerabilities in its NetScaler ADC and NetScaler Gateway products.
Rapid Response
How to find AMI MegaRAC BMCs
July 20, 2023
This week, Eclypsium Research published findings on critical vulnerabilities discovered in AMI MegaRAC baseboard management controller (BMC) firmware.
Asset inventory in higher education is a PhD-level problem
July 18, 2023
Universities have more complexity and less control than a company with a collection of offices. So they need cybersecurity tools and services to...
The best free network scanners for security teams
July 18, 2023
In this article, we compare and contrast several free tools and provide our take on why we believe runZero is best suited for corporate security...
Life at runZero
Employee Spotlight: Chris Benjamin
July 13, 2023
Chris is an animal lover, community volunteer, and horror genre enthusiast. She enjoys spending quality time with her children, husband, and...
Product Release
runZero 3.10 New integrations page, UX improvements, Black Hat 2023!
July 11, 2023
What’s new in runZero 3.10? Integrations page and menu updates, a redesigned Explorer detail page, and a peek at what’s coming soon!
Why NACs are inadequate for cyber asset attack surface management
July 10, 2023
NACs aren’t the best at asset discovery. Allowing or denying access to the network on Layer 2 is their primary function, but finding everything on...
Closing the gap Power your CMDB with CAASM for better ROI
June 29, 2023
According to Gartner, only 25% of organizations achieve meaningful value with their CMDBs. Let’s dig into why and how a CAASM solution can improve...
Life at runZero
Employee Spotlight: Ali Cheikh
June 27, 2023
Ali is a talented Sales Engineer with over 14 years of experience in the field. Learn more about what Ali had to say about working for runZero.
The limitations of vulnerability scanners for cyber asset attack surface management
June 20, 2023
Beyond a lack of detail, vulnerability scanners sometimes simply get it wrong; crashing devices, providing a backward-looking view, finding phantom...
© Copyright 2024 runZero, Inc. All Rights Reserved