See what we're thinking about, working on, & blogging about.

Explore the latest insights, ideas, & opinions from our talented team of experts & researchers.

Subscribe Now

Get our latest Rapid Responses, insights, and blogs delivered directly to your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Rapid Response
How to find Cisco Catalyst SD-WAN installations on your network
March 12, 2026
Cisco disclosed versions of Cisco Catalyst SD-WAN Controller & Manager contain a vulnerability in the peering auth mechanism. How to find affected...
Rapid Response
How to find Gogs installations on your network
March 10, 2026
Certain Gog versions are affected by a cross-repository Large File Storage (LFS) object overwrite vulnerability due to missing content hash...
Rapid Response
How to find Nginx UI installations on your network
March 9, 2026
Versions of Nginx UI are affected by a vulnerability that allows for unauthenticated backup data downloads and disclosure of associated encryption...
Rapid Response
How to find Juniper Networks Junos OS Evolved installations on your network
March 6, 2026
Juniper Networks disclosed versions of Junos OS Evolved running on PTX Series routers contain a critical vulnerability. How to find affected assets.
Rapid Response
How to find Cisco Secure Firewall Management Center installations on your network
March 5, 2026
Cisco disclosed that certain versions of Cisco Secure Firewall Management Center are affected by critical vulnerabilities (CVE-2026-2007,...
Use Cases
How to optimize runZero scanning for global networks
February 26, 2026
Enterprise networks are complex. In this guide, we show how to optimize runZero for large-scale deployments using a hypothetical retail enterprise...
Rapid Response
How to find Roundcube Webmail on your network
February 20, 2026
A Roundcube Webmail vulnerability would allow a remote, authenticated attacker to perform RCE due to deserialization of untrusted data.
Rapid Response
How to find Grandstream VoIP phones on your network
February 19, 2026
Security researchers at Rapid7 reported a stack-based buffer overflow vulnerability that allows remote root RCE. Here's how to find affected assets.
Use Cases
CISA BOD 26-02, EOS, and runZero
February 19, 2026
CISA is keeping its EOS device list under wraps. Our resident former fed breaks down BOD 26-02 and shares a runZero query to help you find your...
Rapid Response
How to find Dell RecoverPoint installations on your network
February 18, 2026
Dell disclosed certain versions of Dell RecoverPoint for Virtual Machines contain a hardcoded credential vulnerability. Here's how to find affected...
Rapid Response
How to find SolarWinds Web Help Desk services on your network
February 13, 2026
SolarWinds has disclosed multiple vulnerabilities affecting certain versions of WHD: CVE-2025-40551, CVE-2025-40552, CVE-2025-40553,...
runZero Research
How to use the KEV collider: A quick tour
February 12, 2026
Layer signals and test filters to see risk indicators interact across the KEV catalog in real time. No install. No creds. Just open & start...