runZero Hour, Ep. 22: Poking the bear (safely) - our expanded vuln checks

Ready to radically change the way you scan for vulnerabilities? 

We just added hundreds of new critical remote vulnerability checks to runZero that run safely across all your environments and are way faster than traditional scanning. Plus, our unauthenticated approach delivers much broader detection coverage encompassing everything from unmanaged assets to critical edge devices. Want to know how we do it? Watch the video above to find out!

Our own Tod Beardsley, Rob King and Ali Cheikh dive into:

  • What’s included in our expanded vuln checks
  • Poking the bear...safely: how we run active vulnerability probes without knocking things over
  • How we creatively combine runZero’s fingerprinting superpowers with the open source Nuclei engine to deliver better and faster scanning
  • Updates on what we’ve committed back to the Nuclei project, including some new OT additions you will want to check out
  • Our monthly rapid response roundup, of course!

Meet Our Speakers

Rob King

Director of Applied Research, runZero

todb

VP of Security Research, runZero

Ali Cheikh

Senior Sales Engineer

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 25: The Holiday Hackstravaganza!
Tod Beardsley, Rob King, (and special guests!) look back at 2025’s wildest vulnerabilities, standout research, and make bold predictions for 2026.
Webcasts
Attack Surface Management: Continuous discovery, external attack paths
Your attack surface no longer ends at the firewall. With SaaS apps, cloud instances, IoT, and shadow IT multiplying, organizations are exposed in...
Webcasts
runZero Hour, Ep. 24: Attack graphs with runZero and BloodHound!
In this episode, runZero's Tod Beardsley, Rob King, HD Moore and Jared Atkinson, CTO of SpecterOps, dive into the tangled world of modern attack...
Webcasts
Fixing a broken system: why legacy vuln management tools can’t keep up
Watch the on-demand webcast on the future of exposure management, featuring attacker-driven strategies, continuous visibility, and rapid remediation.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.