runZero Hour, Ep. 5: XZ Utils Backdoor

On this episode of runZero Hour, the runZero Research team dove into some hot topics, including:

XZ Utils Backdoor (CVE-2024-3094)

It’s the latest vulnerability that almost took down the digital world as we know it… and kept our researchers busy all weekend. Tune in to hear our research team break down the fascinating chain of events that unfolded with the XZ Utils backdoor and see what their analysis uncovered about the vulnerability itself. They’ll also be happy to show you how runZero can help identify potentially affected systems running recent OpenSSH versions on Fedora, OpenSUSE, Debian, and Kali Linux distributions.

Rapid Response Roundup

We also discussed our recent Rapid Responses for lighttpd web servers, D-Link NAS Storage products, PAN-OS, Flowmon, and more.

Meet Our Speakers

Blain Smith

Security Research Engineer

Rob King

Director of Security Research

HD Moore

Founder & CEO

Tom Sellers

Principal Research Engineer

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 13: Anniversary episode reflecting on 2024 through the lens of IT-OT/IoT convergence
In this special anniversary episode we gathered an all-star panel of cybersecurity experts to look back on 2024 through the lens of IT-OT/IoT...
Webcasts
runZero Hour, Ep. 12: A deep-dive into OT devices, protocols, and vulnerabilities
In this month’s episode of runZero Hour, we take a deep dive into new research insights on OT devices, protocols, and vulnerabilities.
Webcasts
Dangerous Dark Matter: Confronting the Creepy Unknowns in Your Network
We explore the hidden threats and “network dark matter” lurking within your environment, viewed through the lens of zero-day vulnerabilities.
Webcasts
runZero Hour, Ep. 11: A CISA insider's perspective on managing the KEV catalog
Tod Beardsley, CISA cybersecurity expert offers an insider’s look into CISA’s mission and management of the Known Exploited Vulnerabilities (KEV)...

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2024 runZero, Inc. All Rights Reserved