Rapid Response


Rapid Response
How to find Lexmark printer assets on your network
February 3, 2023
Printer manufacturer Lexmark recently published details on a vulnerability that affects over 100 of their printer models. Learn how runZero can...
Rapid Response
How to find Veeam Backup & Replication instances
December 16, 2022
Veeam recently published information on two vulnerabilities in the Veeam Backup & Replication product, originally reported by Nikita Petrov of...
Rapid Response
How to find Cisco 7800 and 8800 series IP phone assets on your network
December 9, 2022
Cisco 7800 and 8800 IP phones can be found in many companies and organizations. Successful exploitation of this vulnerability can provide an...
Rapid Response
How to find Ubiquiti devices on your network
August 31, 2022
Earlier this year, Ubiquiti, a popular networking equipment manufacturer for businesses and consumers, disclosed a security breach that potentially...
Rapid Response
How to find DrayTek Vigor routers
August 4, 2022
The Trellix Threat Labs Vulnerability Research team recently published vulnerability details affecting almost 30 models of DrayTek Vigor routers.
Rapid Response
How to find Microsoft VPN/PPTP
June 21, 2022
Last month, researcher Alex Nichols at Nettitude reported a vulnerability in Microsoft’s Windows VPN software that could allow for remote code...
Rapid Response
How to find Microsoft Windows Kerberos, NFS and Domain Controller assets
May 12, 2022
Microsoft recently released security updates for over 70 vulnerabilities, including 3 zero-days and 7 critical vulnerabilities that affect a...
Rapid Response
How to find F5 BIG-IP instances
May 5, 2022
Technology vendor F5 recently published information on over 40 vulnerabilities, mostly affecting their BIG-IP line of products.
Rapid Response
How to find Netatalk instances
April 29, 2022
A critical vulnerability in the Netatalk open source file server software was found in some popular network attached storage (NAS) devices.
Rapid Response
How to find applications & services that use Log4J
April 26, 2022
runZero can help you build an up-to-date asset inventory and search for assets that may be affected by Log4J vulnerabilities, such as Log4shell.
Rapid Response
How to find Kaspersky AV on your Windows endpoints
March 30, 2022
Late last week, the U.S. Federal Communications Commission announced it had added Russian-based Kaspersky Lab to its Covered List, maintained by...
Rapid Response
How to find APC assets
March 9, 2022
Researchers at Armis recently published details on three new vulnerabilities affecting cloud-connected APC Smart-UPS devices manufactured by...
© Copyright 2024 runZero, Inc. All Rights Reserved