runZero Hour, Ep. 24: Attack graphs with runZero and BloodHound!

In this episode Tod Beardsley and Rob King together with special guests HD Moore and Jared Atkinson, CTO of SpecterOps, dive into the tangled world of modern attack surfaces. 

See how runZero and Bloodhound combined forces to visualize complex attack paths, reveal hidden exposures, and help defenders think like adversaries.

Here’s what to expect:

  • Attack graphs with runZero + BloodHound: introducing runZeroHound!
  • Insights from SpecterOps CTO Jared Atkinson on BloodHound’s evolution and how graph-based analysis transforms detection and response
  • runZero’s recent coordinated vulnerability disclosure (CVD) with SSHamble (and why CVD is harder than it looks)
  • A look at what's happened to EoL trend data by industry since Winpocalypse
  • The Rapid Response Rundown, on this month’s more interesting vulnerabilities

Meet Our Speakers

Rob King

Director of Applied Research, runZero

HD Moore

Founder & CEO, runZero

todb

VP of Security Research, runZero

Jared Atkinson

Chief Technology Officer, SpecterOps

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
How TeamSystem accelerates M&A integration with runZero
Learn how TeamSystem used runZero to accelerate M&A integration, reduce risk, and maintain confidence while scaling.
Webcasts
runZero Hour, Ep. 26: Exploring offseason resorts and OT networks with Brianna Cluck
In the first 2026 episode of runZero Hour, Rob King and Tod Beardsley chat it up with fan-favorite OT expert Brianna Cluck from GreyNoise...
Webcasts
runZero Hour, Ep. 25: The Holiday Hackstravaganza!
Tod Beardsley, Rob King, (and special guests!) look back at 2025’s wildest vulnerabilities, standout research, and make bold predictions for 2026.
Webcasts
Attack Surface Management: Continuous discovery, external attack paths
Your attack surface no longer ends at the firewall. With SaaS apps, cloud instances, IoT, and shadow IT multiplying, organizations are exposed in...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.