runZero Hour, Episode 7: Fascinating Payloads & New Revelations in Threat Intelligence

In Episode 7 of runZero Hour, we welcome our first guest, Brianna Cluck, Security Research and Detection Engineer, from GreyNoise Labs!

Brianna shared insights on her fascinating work using honeypots to hunt and tag CVE-related traffic in the wild, flagging potential threats for defenders. She is a passionate cyber detective and enthusiastically cracked open the vault to reveal vexing, unsolved security mysteries. Tune in for a live brainstorming session to see how GreyNoise Labs and the runZero research team worked together to solve the 'x-files' mysteries that Brianna has collected in her cybersecurity travels.

The runZero research team also uses honeypots; however, instead of searching for threat activity like GreyNoise Labs, honeypots are goldmines for CAASM-related research, revealing new types of attacker techniques that can then be applied to asset discovery protocols. Learn how HD Moore sets up small honeypots to collect traffic and classify unknown packets quickly, aka 'the lazy way.'

Next, Tom Sellers takes a deep dive into his recent work probing Microsoft servers via TLS and explains how direct customer feedback can help the runZero research team develop more precise fingerprinting for improved asset discovery.

Last, but not least, we shared the most recent Rapid Response highlights. Find potentially vulnerable systems using queries in posts below; fun fact, you can use these with our free trial and Community Edition, along with our licensed Platform. Enjoy!

    Meet Our Speakers

    HD Moore

    Founder & CEO

    Rob King

    Director of Security Research

    Tom Sellers

    Principal Research Engineer

    Brianna Cluck

    Security and Detection Engineering Researcher at Greynoise

    Subscribe Now

    Get the latest news and expert insights delivered in your inbox.

    Welcome to the club! Your subscription to our newsletter is successful.


    Related Resources

    Webcasts
    runZero Hour, Episode 11: A CISA insiders's perspective on managing the KEV catalog
    Tod Beardsley, CISA cybersecurity expert offers an insider’s look into CISA’s mission and management of the Known Exploited Vulnerabilities (KEV)...
    Webcasts
    runZero Hour, Episode 10: RDP security, ATG & PC-WORX OT protocols
    We dug into the details of three different protocols, and explored how our exceptionally creative customers help drive innovation in our platform.
    Webcasts
    runZero Hour: Episode 9 (SSHamble Edition)
    Didn't make it to DEF CON 32? We got you! This episode of runZero Hour explores all things SSH, including our new open-source tool: SSHamble.
    Webcasts
    Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
    Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...

    See Results in Minutes

    Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

    © Copyright 2024 runZero, Inc. All Rights Reserved