Articles


Article
To Raise or Not to Raise: Bootstrapped Founders Share Their Views
A trio of startup founders — GreyNoise's Andrew Morris, Thinkst Canary's Haroon Meer, and runZero's HD Moore — agree that raising venture capital...
Article
runZero partners with Aqaio to expand cybersecurity solutions in Germany
runZero teams up with Aqaio to enhance its exposure management platform in Germany, aiming to tackle the complex cyber threat landscape with...
Article
Why we must go beyond tooling and CVEs to illuminate security blind spots
Incomplete visibility across the attack surface leads to unmanaged exposure. Defense demands context-aware discovery. Tod Beardsley expands on why...
Article
Five Minutes With: A Pen Test Pioneer
Metasploit Project founder HD Moore explains why today’s vulnerability management model is broken.
Article
Large enterprises scramble after supply-chain attack spills their secrets
tj-actions/changed-files corrupted to run credential-stealing memory scraper.
Article
DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers
Apple's defenses that protect data from being sent in the clear are globally disabled.
Article
How to combat exfiltration-based extortion attacks
How to defend against exfiltration based attacks, featuring Wes Hutcherson, Director for Product Marketing at runZero.
Article
Visibility the starting point for many security pitches
Whether it be DORA or just trying to reduce the risk profile for a user, those in the channel with the expertise to uncover risk are set to benefit
Article
Silent But Deadly: The True Impact of Unknown & Unmanaged Assets on Network Security
A clear picture of your environment is an invaluable asset when establishing a comprehensive risk management framework. This process begins with...
Article
Revealing hidden threats: how runZero is redefining network security
4i magazine interviewed Wes Hutcherson, Director of Product Marketing at runZero, about the growing threat of unknown and unmanaged assets in...
Article
Security chiefs whose companies operate in the EU should be exploring DORA now
Determining if your entity falls within DORA should be on the radar of every CRO, general counsel, and CISO whose company operates in Europe,...
Article
How SSH Flaws Expose Vulnerabilities, Endanger Enterprises
SSH is designed for secure communications, but common misconfigurations significantly expose systems to threats. Watch this interview with Rob...