runZero Hour, Ep. 22: Poking the bear (safely) - our expanded vuln checks

Ready to radically change the way you scan for vulnerabilities? 

We just added hundreds of new critical remote vulnerability checks to runZero that run safely across all your environments and are way faster than traditional scanning. Plus, our unauthenticated approach delivers much broader detection coverage encompassing everything from unmanaged assets to critical edge devices. Want to know how we do it? Watch the video above to find out!

Our own Tod Beardsley, Rob King and Ali Cheikh dive into:

  • What’s included in our expanded vuln checks
  • Poking the bear...safely: how we run active vulnerability probes without knocking things over
  • How we creatively combine runZero’s fingerprinting superpowers with the open source Nuclei engine to deliver better and faster scanning
  • Updates on what we’ve committed back to the Nuclei project, including some new OT additions you will want to check out
  • Our monthly rapid response roundup, of course!

Meet Our Speakers

Rob King

Director of Applied Research, runZero

todb

VP of Security Research, runZero

Ali Cheikh

Senior Sales Engineer

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
How TeamSystem accelerates M&A integration with runZero
Learn how TeamSystem used runZero to accelerate M&A integration, reduce risk, and maintain confidence while scaling.
Webcasts
runZero Hour, Ep. 26: Exploring offseason resorts and OT networks with Brianna Cluck
In the first 2026 episode of runZero Hour, Rob King and Tod Beardsley chat it up with fan-favorite OT expert Brianna Cluck from GreyNoise...
Webcasts
runZero Hour, Ep. 25: The Holiday Hackstravaganza!
Tod Beardsley, Rob King, (and special guests!) look back at 2025’s wildest vulnerabilities, standout research, and make bold predictions for 2026.
Webcasts
Attack Surface Management: Continuous discovery, external attack paths
Your attack surface no longer ends at the firewall. With SaaS apps, cloud instances, IoT, and shadow IT multiplying, organizations are exposed in...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.