runZero Hour, Ep. 7: Fascinating Payloads & New Revelations in Threat Intelligence

In Episode 7 of runZero Hour, we welcome our first guest, Brianna Cluck, Security Research and Detection Engineer, from GreyNoise Labs!

Brianna shared insights on her fascinating work using honeypots to hunt and tag CVE-related traffic in the wild, flagging potential threats for defenders. She is a passionate cyber detective and enthusiastically cracked open the vault to reveal vexing, unsolved security mysteries. Tune in for a live brainstorming session to see how GreyNoise Labs and the runZero research team worked together to solve the 'x-files' mysteries that Brianna has collected in her cybersecurity travels.

The runZero research team also uses honeypots; however, instead of searching for threat activity like GreyNoise Labs, honeypots are goldmines for CAASM-related research, revealing new types of attacker techniques that can then be applied to asset discovery protocols. Learn how HD Moore sets up small honeypots to collect traffic and classify unknown packets quickly, aka 'the lazy way.'

Next, Tom Sellers takes a deep dive into his recent work probing Microsoft servers via TLS and explains how direct customer feedback can help the runZero research team develop more precise fingerprinting for improved asset discovery.

Last, but not least, we shared the most recent Rapid Response highlights. Find potentially vulnerable systems using queries in posts below; fun fact, you can use these with our free trial and Community Edition, along with our licensed Platform. Enjoy!

    Meet Our Speakers

    HD Moore

    Founder & CEO

    Rob King

    Director of Security Research

    Tom Sellers

    Principal Research Engineer

    Brianna Cluck

    Security and Detection Engineering Researcher at Greynoise

    Subscribe Now

    Get the latest news and expert insights delivered in your inbox.

    Welcome to the club! Your subscription to our newsletter is successful.


    Related Resources

    Webcasts
    runZero Hour, Ep. 12: A deep-dive into OT devices, protocols, and vulnerabilities
    In this month’s episode of runZero Hour, we take a deep dive into new research insights on OT devices, protocols, and vulnerabilities.
    Webcasts
    Dangerous Dark Matter: Confronting the Creepy Unknowns in Your Network
    We explore the hidden threats and “network dark matter” lurking within your environment, viewed through the lens of zero-day vulnerabilities.
    Webcasts
    runZero Hour, Ep. 11: A CISA insider's perspective on managing the KEV catalog
    Tod Beardsley, CISA cybersecurity expert offers an insider’s look into CISA’s mission and management of the Known Exploited Vulnerabilities (KEV)...
    Webcasts
    runZero Hour, Ep. 10: RDP security, ATG & PC-WORX OT protocols
    We dug into the details of three different protocols, and explored how our exceptionally creative customers help drive innovation in our platform.

    See Results in Minutes

    Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

    © Copyright 2024 runZero, Inc. All Rights Reserved