See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

How to find systems impacted by CVE-2024-3094 (XZ Utils backdoor) Rapid Response

Malicious code was pushed to the libxz-utils project that introduced a backdoor in SSH. Here's how to find potentially vulnerable systems.

Subscribe Now

Get our latest Rapid Responses, insights, & blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Product Release
runZero 3.4 Vulnerability import from CrowdStrike Spotlight (plus something for everyone)
December 13, 2022
What’s new in runZero 3.4? Vulnerability import from CrowdStrike, integration improvements and enhancements, OAuth Client Secret authentication,...
Rapid Response
How to find Cisco 7800 and 8800 series IP phone assets on your network
December 9, 2022
Cisco 7800 and 8800 IP phones can be found in many companies and organizations. Successful exploitation of this vulnerability can provide an...
Industry
CISA BOD 23-01 requires asset visibility and vulnerability detection as foundational requirements
November 22, 2022
CISA released the BOD 23-01 in an effort to stengthen the national security posture with new asset inventory and vulnerability management...
Product Release
A 365-degree view of your Microsoft environment
November 22, 2022
As the scope of corporate networks has been constantly expanding over time, the challenge of maintaining an accurate asset inventory and...
Product Release
runZero 3.3 Unmatched visibility into your Google ecosystem
November 15, 2022
What’s new in runZero 3.3? Visibility into Google Workspace, fingerprinting for Google assets, identification of OpenSSL services, and improvements...
Industry
Which discovery approach works best for unmanaged devices?
November 3, 2022
Unmanaged devices are the Achilles heel of any asset inventory. Shadow IT, rogue, or orphaned devices are easy targets for the adversary to gain...
Product Release
Introducing the runZero Infinity Partner Program
November 1, 2022
The runZero Infinity Partner Program provides partners with the resources, enablement, content, training, and support to deliver a powerful cyber...
Product Release
How runZero finds unmanaged devices on your network
October 28, 2022
How do you find unmanaged devices on your network when they aren't accounted for? Learn how you can use runZero to find unmanaged devices on your...
Product Release
runZero 3.2 A 365-degree view of your Microsoft environment
October 18, 2022
What’s new in runZero 3.2? Integrations with Microsoft 365 Defender and Microsoft Intune, querying and reporting for Active Directory users and...
Industry
Why unmanaged devices are a challenge for IT and security programs
October 18, 2022
Why do unmanaged devices matter? We discuss the importance of knowing about the unmanaged devices on your network, highlight some issues stemming...
Product Release
Scanning your external attack surface with runZero
September 16, 2022
runZero is an internal asset inventory and network discovery tool, but has the ability to discover public-facing hosts as well. In this article,...
Life at runZero
The rundown on becoming runZero What I learned rebranding a company - Part 4
September 16, 2022
runZero CEO and Co-Founder Chris Kirsch shares his learnings from his experience rebranding the company. This four-part series breaks down all the...
© Copyright 2024 runZero, Inc. All Rights Reserved