Exposure management needs a reboot. Great research is the key to innovating new solutions.

Securing your total attack surface has never been more challenging. We believe that applied research is fundamental to building better security solutions to address both new problems and the persistent ones that dog security teams. By sharing our research, tools, and knowledge with our community, we can help each other proactively improve our defenses and raise the bar on attackers.

SSHamble: Exploit SSH protocol vulnerabilities

The runZero research team discovered a range of weaknesses across SSH applications that impact critical network security devices and software. These long standing issues remained undiscovered due to the lack of tooling available – until now!

Join us for Hacker Summer Camp!

Join us in Las Vegas, August 4–10, for a week of action at BSides, Black Hat, DEF CON, and more.

We've got six talks to take in and crews in every venue you'll want to visit – it's going to be an epic week with lots of great adventures! We can't wait to see you!

Divining Risk: Deciphering Signals From Vulnerability Scores

Vulnerability scores promise clarity, but too often just add to the noise.

We analyzed signals from over 270,000 CVEs to reveal what CVSS, EPSS, and SSVC actually tell us — and what they don’t.

Background Image

runZero Hour Webcast

Join us on August 20
for a Summer Camp recap!

New tools, fresh tactics, and key takeaways

In this post-Hacker Summer Camp recap, Tod Beardsley, Rob King, HD Moore, and Matthew Kienow break down the most practical insights from BSidesLV, Black Hat and DEF CON.

From tool debuts to emerging trends, this episode highlights what stood out and why it matters. 

Whether you made it to Vegas or not, this is the download you don’t want to miss!

Summer Camp Season!

runZero Research on the Road

See us speak in Las Vegas, August 4–10!

Join us for a wild week of action at BSides, Black Hat, DEF CON, and beyond!

BSides • August 4 @ 11am PDT
Turbo Tactical Exploitation: 22 Tips for Tricky Targets
Take a whirlwind tour through 22 practical exploitation tips fast than you can say SYN/ACK-ACK.

From recon to lateral movement (and everything in between), these techniques are built for speed and getting the most out of every packet, port, and pivot.

Whether you’re on a red team or just want to better understand your exposure, you’ll leave with new ways to spot weak links fast — and exploit them even faster.
Learn More
Diana Initiative • August 4 @ 3pm PDT
Forging Strong Cyber Communities in Uncertain Times
HD Moore and Nicole Schwartz explore what it takes to create and foster robust cybersecurity communities and why we should all get involved in these important initiatives — now more than ever. HD will share insights from developing the open-source Metasploit Project, drawing parallels with the enduring principles of in-person community building that Nicole and her fellow board members rely upon to grow and sustain The Diana Initiative.

Learn strategies for initiating and scaling these networks, discover ways to contribute regardless of skillset, and see why participation is crucial to building collective resilience against evolving cyber threats.
Learn More
BSides • August 5 @ 1pm PDT
What Should CVE Be When It Grows Up?
The CVE Program is a pillar of the cybersecurity ecosystem.

Over the past 18 months, the CVE Program and U.S. National Vulnerability Database have faced funding challenges, while the EU has launched its own vulnerability database. In June, Congress called for a formal audit of the program.

This panel at BSides, featuring runZero's own Tod Beardsley, will discuss the future of the CVE Program, how it should effectively communicate its value to policymakers, and how to preserve its role without fracturing the broader vulnerability disclosure ecosystem.
Learn More
Black Hat • August 5 @ 3pm PDT
Self-Funded Security: Bootstrapping Your Way to Success in Cyber
This discussion will highlight how bootstrapping enables cybersecurity founders to develop battle-tested solutions with direct customer feedback, establish stronger product-market fit, and build operational resilience that becomes increasingly valuable in uncertain economic conditions.

Panelists will share practical strategies unique to the security industry, including how to leverage open-source contributions and security community relationships to gain traction without significant capital investment.
Learn More
Black Hat Arsenal • August 6 @ 11am PDT
Akheron Proxy - Interchip communication serial proxy
Matthew Kienow and Deral Heiland will be at Black Hat Arsenal Station 9 diving into Akheron Proxy, a serial communication proxy application tool designed to connect and proxy serial communication between microprocessors on a hardware circuit board.

See how to capture, decode, replay, and fuzz serial communications flowing between microprocessors on an embedded device circuit board in real time.
Learn More
Black Hat • August 7 @ 2:30pm PDT
Vulnerability Haruspicy: Picking Out Risk Signals from Scoring System Entrails
Join Tod Beardsley, runZero VP of Security Research, as he digs into the strengths, weaknesses, and absurdities of CVSS, EPSS, and SSVC, comparing them to the reality of how security teams actually handle vulnerabilities.

Tod will explore where these models help, where they mislead, and whether any of them are meaningfully better than rolling a D20 saving throw vs exploitation. Plus, we'll be unveiling a new tool to help you stay on top of the dynamic and sometimes surprising nature of these scoring systems!
Learn More
DEF CON ICS Village • August 9 @ 11am PDT
There and Back Again: Detecting OT Devices Across Protocol Gateways
Join Rob King, Director of Applied Research, for a discussion on legacy protocols that are still widely used in the OT world and how devices that speak them are often hidden behind protocol gateways.

Rob will also share creative methodologies for discovering devices on the other side of these gateways safely and effectively. Come jump down the OT rabbit hole with us!
Learn More
DEF CON Main Stage • August 9 @ 3pm PDT
Shaking Out Shells with SSHamble
Secure Shell (SSH) is finally fun again! After a wild two years, including a near-miss backdoor, clever cryptographic failures, unauthenticated remote code execution in OpenSSH, and piles of state machine bugs and authentication bypass issues, the security of SSH implementations has never been more relevant.

This session is an extension of our 2024 work (Unexpected Exposures in the Secure Shell) and includes new research as well as significant updates to our open source research and assessment tool, SSHamble.
Learn More

Talk

BSidesSF: Charting the SSH Multiverse with HD Moore

The Secure Shell (SSH) is the most commonly exposed dedicated management protocol, second only to HTTP in terms of internet-wide exposure, and it’s had a rocky year. This presentation explores the multitude of SSH implementations, their specific weaknesses, and real-world exposures.

Keynote

NSEC: A Pirate's Guide to Snake Oil & Security

Watch as HD Moore takes you on a satirical voyage through the crowded world of vulnerability management. From clashing tribes to competing frameworks, HD examines how defenders can navigate vendor claims and hype to uncover what actually works.

On-Demand

Vulnerability management is broken: what's the fix?

HD Moore and Omdia analyst Rik Turner discuss why traditional vulnerability management is struggling in modern IT infrastructures, why CVEs don’t tell the full story, and why prioritization alone isn’t enough to close critical security gaps. They also explore how exposure management offers a fundamentally different approach that’s better suited for today’s evolving threat landscape.

Background Image

Research Report: Volume 1

Uncovering Alarming Gaps & Unexpected Exposures

The runZero research team analyzed millions of assets across hundreds of enterprise networks, including internal infrastructure, internet-facing assets, and cloud environments. We found alarming gaps, unexpected trends, and much more.

Latest runZero Hour Episodes

Watch recent episodes of our monthly research webcast exploring all things exposure and timely security topics.

Webcasts
runZero Hour, Ep. 20: Reshaping security with open source: Insights from ProjectDiscovery & runZero
On this episode, we celebrate open source collaboration with the minds behind ProjectDiscovery: Rishiraj Sharma and Sandeep Singh, the co-founders...
Webcasts
runZero Hour, Ep. 19: Mission: Contextualize – LLMs, MCP, and the future of vulnerability intelligence
Jerry Gamblin joins us for a deep dive into today’s vulnerability landscape — from CVE trends and statistics to the launch of his new MCP (Model...
Webcasts
runZero Hour, Ep. 18: Unpacking vulnerability scoring systems with EPSS expert Jay Jacobs
Vulnerability scoring expert Jay Jacobs joins us for an insightful session exploring how scoring systems like CVSS, EPSS, and SSVC signal risk —...
Webcasts
runZero Hour, Ep. 17: The state of vuln management, our approach, and a deep dive into new risk findings
On this special edition of runZero Hour, join Tod Beardsley and Rob King for a deep dive into the future of exposure management.
Webcasts
runZero Hour, Ep. 16: Handling EOL’d operating systems, runZero Starlink integration, and more!
Former CISA Section Chief and now VP of Security Research at runZero Tod Beardsley shares insights on handling end-of-life operating systems like...
Webcasts
runZero Hour, Ep. 15: Network topology, detailed fingerprinting and MODBUS love
On this episode of runZero Hour, Rob King and Tom Sellers welcome Brianna Cluck, researcher extraordinaire from GreyNoise Intelligence, covering a...
Webcasts
runZero Hour, Ep. 14: Introducing Inside-Out Attack Surface Management
New inside-out attack surface management capabilities, tips for discovering elusive TLS and SSH stacks, a deep dive on the iSCSI protocol, and new...
Webcasts
runZero Hour, Ep. 13: Anniversary episode reflecting on 2024 through the lens of IT-OT/IoT convergence
In this special anniversary episode we gathered an all-star panel of cybersecurity experts to look back on 2024 through the lens of IT-OT/IoT...
Webcasts
runZero Hour, Ep. 12: A deep-dive into OT devices, protocols, and vulnerabilities
In this month’s episode of runZero Hour, we take a deep dive into new research insights on OT devices, protocols, and vulnerabilities.
Webcasts
runZero Hour, Ep. 11: A CISA insider's perspective on managing the KEV catalog
Tod Beardsley, CISA cybersecurity expert offers an insider’s look into CISA’s mission and management of the Known Exploited Vulnerabilities (KEV)...
Webcasts
runZero Hour, Ep. 10: RDP security, ATG & PC-WORX OT protocols
We dug into the details of three different protocols, and explored how our exceptionally creative customers help drive innovation in our platform.
Webcasts
runZero Hour, Ep. 9: (SSHamble Edition)
Didn't make it to DEF CON 32? We got you! This episode of runZero Hour explores all things SSH, including our new open-source tool: SSHamble.

Latest Research Blogs

Dive into the latest findings, insights, and observations on attack surfaces from our research team.

runZero Research
Reshaping security with open source: runZero's collaboration with ProjectDiscovery
ProjectDiscovery co-founders Rishi and Sandeep joined our research team to explore how open source is driving the next wave of security tooling.
runZero Research
Out-of-Band, Part 1: The new generation of IP KVMs and how to find them
We begin the series exploring security risks of OoB management devices like BMCs, serial console servers, and IP-enabled KVMs, and share how to...
runZero Research
CVSS, EPSS, and SSVC: How to Read Between the Vulnerability Scores
Learn about strengths and limitations of each scoring systems – and how to best leverage them inform your triage strategy.
runZero Research
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
On our latest episode of runZero Hour I sat down with Rob King and Jerry Gamblin, Principal Engineer at Cisco, to dig into the state of...
runZero Research
Labelling for End-of-Life Consumer IoT
IOT labelling is back on the menu, but how to actually do it is still tricky.
runZero Research
RDP security: The impact of secure defaults and legacy protocols
Explore the evolution of the Remote Desktop Protocol to become secure by default and learn how to audit your environment for risky RDP configurations.
runZero Research
Proven fingerprinting techniques for effective attack surface management
Precise asset identification is critical for effective cyber asset attack surface management. See how runZero’s techniques are unmatched.
runZero Research
How to detect SSH key reuse
Unmanaged SSH keys leaves networks vulnerable to cyber attacks. Learn how Zero helps with auditing SSH keys to reduce unnecessary exposures on your...
runZero Research
End-of-life assets: managing risks in outdated technology
Outdated assets create a more accessible entry point for attackers to exploit your attack surface. Learn how the runZero Platform effectively...
runZero Research
Cyber asset management in the era of segmentation decay
Network segmentation faces limitations with modern equipment. See how a CAASM approach can improve asset discovery and threat protection.
Product
How runZero speaks to the TwinCAT 3 Automation Device Specification (ADS) protocol
In industrial automation, TwinCAT 3’s Automation Device Specification (ADS) protocol ensures seamless communication between components and systems....
runZero Research
Unusual Assets: The riskiest factor in attack surface management
runZero’s research finds outlier assets, even if just slightly unusual, are often significantly riskier than others. The outlier score gives...

Latest Rapid Responses

Get tips on addressing 0-day threats and see how to uncover them immediately with runZero prebuilt queries.

Rapid Response
How to find Squid caching proxy installations on your network
Squid has disclosed a heap-based buffer overflow vulnerability in certain versions of the Squid caching proxy due to incorrect buffer management...
Rapid Response
How to find SUSE Multi-Linux Manager installations on your network
SUSE has disclosed an unauthenticated remote code execution (RCE) vulnerability in certain versions of SUSE Multi-Linux Manager, formerly SUSE...
Rapid Response
How to find Barracuda Networks assets on your network
Certain versions of Barracuda Networks Barracuda Message Archiver (BMA) are affected by a reflected Cross-Site Scripting (XSS) vulnerability.
Rapid Response
How to find RUCKUS Networks assets on your network
Eight critical vulnerabilities have been disclosed affecting certain models and versions of RUCKUS Networks management products. Here's how to find...
Rapid Response
How to find Tridium Niagara instances on your network
Tridium (a Honeywell company) has disclosed ten vulnerabilities in certain versions of Niagara Framework and Niagara Enterprise Security.
Rapid Response
How to find VMware ESXi installations on your network
Broadcom has disclosed four vulnerabilities in certain versions of VMware ESXi, Workstation, Fusion, and Tools. Here's how to find affected assets.
Rapid Response
How to find Microsoft SharePoint Server installations on your network
Multiple vulnerabilities have been disclosed in Microsoft SharePoint Server web services. Here's how to find affected assets.
Rapid Response
How to find CrushFTP installations on your network
CrushFTP has disclosed a vulnerability affecting specific versions of its file transfer software, confirmed to be under active exploitation in the...
Rapid Response
How to find Fortinet assets on your network
Fortinet has issued an advisory for a vulnerability affecting certain versions of their FortiWeb product. Here's how to find affected assets.
Rapid Response
How to find Cisco Identity Services Engine (ISE) installations
Three vulnerabilities have been disclosed in certain versions of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector...
Rapid Response
How to find Wing FTP Server installations on your network
Multiple vulnerabilities were disclosed in certain versions of Wing FTP Server, with evidence of the vulnerability being actively exploited in the...
Rapid Response
How to find Phoenix Contact devices on your network
In July 2025, Phoenix Contact disclosed vulnerabilities in certain models and versions of their AC charging controller and PLC firmware.
Background Image

Explorers, innovators, & experts

Meet the team behind our research.

We are a group of industry veterans with decades of experience in information security, who are committed to runZero’s foundational principle that applied research makes for better asset discovery, and that better asset discovery is the foundation of modern exposure management.

The goal of the runZero research team is to discover incredibly efficient ways to pinpoint at-risk devices and quickly get this information into the hands of our customers and community. We achieve this through both precise fingerprinting and fast outlier analysis across IT, OT, IoT, cloud, mobile, and remote environments. 

HD Moore

Founder & CEO

HD Moore is the founder and CEO of runZero. Previously, he founded the Metasploit Project and served as the main developer of the Metasploit Framework, which is the world's most widely used penetration testing framework.

More from HD Moore

Rob King

Director of Applied Research

Rob King is the Director of Applied Research at runZero. Over his career Rob has served as a senior researcher with KoreLogic, the architect for TippingPoint DVLabs, and helped get several startups off the ground. Rob helped...

More from Rob King

Tom Sellers

Principal Research Engineer

Tom Sellers is a Principal Research Engineer at runZero. In his 25 years in IT and Security he has built, broken, and defended networks for companies in the finance, service provider, and security software industries. He has...

More from Tom Sellers

todb

Vice President of Security Research

Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infra...

More from todb

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.