What Is An Attack Surface?
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
Our latest update enhances the asset permission capabilities within the platform, introducing Asset Level Permissions and Asset Group Permissions.
Introducing the ‘One Issue View,’ a transformative feature now available on the Main Dashboard and Issues page.
April 2025 Application Features One Issue View with Enhanced Permission Capabilities Overview Introducing the ‘One Issue View,’ a transformative feature
March 2025 Platform Release: Attack Surface Management (ASM) Visualization transforms the way organizations monitor and secure their digital assets.
March 2025 Application Features Attack Surface Management (ASM) Visualization Overview Introducing the Attack Surface Management (ASM) Visualization, an innovative feature
We’re proud to announce that Rootshell Security has been awarded the Bronze Award under the Defence Employer Recognition Scheme (ERS), a significant milestone in our commitment to supporting defence and the Armed Forces community.
November 2024 Application Features New Features Asset Unmerging/Reassignment Summary: We are pleased to introduce a new feature that allows users to
The Digital Operational Resilience Act The Digital Operational Resilience Act (DORA) is a game-changer for the financial services industry, requiring
Introduction As digital technology continues to reshape the financial services industry, the need for strong cyber resilience has never been
In this digital age, both individuals and organizations face significant threats from cyber attacks. Cybercriminals are continually evolving their attacking strategies to
September 2023 Application Features Email Notification for 2FA Reset – Users will now receive email notifications when their 2FA is reset
Author: Paul Cronin, Co-Founder of Rootshell Phishing scammers, we generally assume, will typically use email as their delivery mechanism to
September 2024 Application Features New Feature Asset Query Optimization – This update is part of our ongoing efforts to improve the
Author: Paul Cronin, Co-Founder Introduction A good friend of mine recently told me of the horror of him trying to
As part of our July Platform Release, over the next few weeks, we will be going into more detail about
As part of our July Platform Release, we will be going into more detail about each of the key improvements.
November 2024 Application Features New Features Data Archiving for Enhanced Performance Summary: In response to the growing datasets of our long-term
Introduction As global attention converges on high-profile events like the Paris 2024 Olympics, the importance of robust cybersecurity measures cannot
Asset Level ACLs We continually strive to enhance the functionality and security of our vulnerability management platform. We are pleased
Elevate Your Web Application Security with Qualys WAS Reports Integration We’re excited to expand our integration capabilities by adding support
Announcing the launch of Public API v1 At Rootshell, we are committed to enhancing the capabilities and success of our
Enhance Your Cybersecurity Operations At Rootshell, innovation drives our mission to provide the most effective and user-friendly cybersecurity solutions. Today,
Author: Shaun Peapell, VP of Global Threat Services, Rootshell Security Rootshell have developed a reporting capability aligned to ‘The MITRE
MITRE ATT&CK® Framework for Partners At Rootshell Security, we are committed to empowering our channel partners with the most advanced
Introduction There are 29.32 billion connected devices in the world today and the number is supposed to go up to 45.72 billion
MITRE ATT&CK® Framework At Rootshell Security, we are continuously seeking ways to advance our cybersecurity tools and methodologies. We are
Author: Paul Cronin, Co-Founder and Partner “You will never find a more wretched hive of scum and villainy.” Obi-Wan warns
May Release As part of our ongoing commitment to enhancing platform functionality and ensuring superior security management, we are excited
February 2024 Application Features New Features Public API v1 for Enhanced Enterprise Integration Summary: We are excited to announce the launch
Author: Thomas Gomer, Security Consultant at Rootshell. Device implants are tools used within penetration testing that can be used to
We are thrilled to unveil our latest operational and channel partner features, designed to amplify our partners’ brand presence, streamline
Author: Paul Cronin, Co-Founder and Partner Voice recognition technology in assistants has transformed how we interact with our devices, making
Author: Andrew Stanistreet, Security Consultant Managed Services Welcome to the second post in my phishing series, in the first I
The recent updates to the Rootshell Platform have set new standards in operational efficiency and security management. Among these updates, we’re unveiling
In a world where cybersecurity threats are ever-evolving, staying ahead with innovative solutions is not just an option but a necessity.
February 2024 Application Features New Features Black Kite Intelligence Integration – We are excited to announce the integration of Black Kite
Author: Paul Cronin, Co-Founder of Rootshell Back in 2014 when dinosaurs ruled the earth, I was fortunate enough to be
Author: Andrew Stanistreet, Security Consultant Managed Services Flavours of Phishing In this first post of this blog series, I want
Author: Paul Cronin, Co-Founder of Rootshell As a penetration tester, I often found it frustrating that the reports I submitted
Author: Shaun Peapell, VP of Global Threat Services As part of Rootshell’s comprehensive security testing strategies, Wi-Fi network security testing
Improved Nessus CVSS Scoring In our ongoing efforts to provide seamless integration and data accuracy, we’ve introduced an important enhancement
Vulnerability Correlation Database A Revolution in Remediation Management We’re taking cybersecurity to the next level with the introduction of a
Customisable SLA Email Content We understand that every organization has unique needs and communication styles, especially when it comes to
November 2023 Application Features New Features SLAs – Customisable Content – We understand that every organization has unique needs and communication
Author: Shaun Peapell, VP of Global Threat Services The cyber security world is an ever-evolving landscape, staying one step ahead
Author: Liam Hackett, Head of Development and creator of Velma, Rootshell’s own AI. It’s been a year since I last
Contextual Understanding for Informed Decisions: Traditional CVSS scores provide a narrow view of threats. Rootshell tried to solve this problem
Author: Shaun Peapell, VP of Global Threat Services As a mature Red Team and Simulated Attack house, we often look
FSQS Registration Renewal We are proud to announce that we have just successfully renewed our registration within the Financial Supplier
Author: Shaun Peapell (VP of Global Threat Services) Throughout my career, I’ve dabbled with wireless burglar alarm systems, which led
Author: Shaun Peapell (VP of Global Threat Services) During this year’s InfoSecurity Show, our team at Rootshell devised an engaging
Author: Paul Cronin (Partner and Co-Founder) Anyone who knows me knows that when I’m not involved in IT security, I’m
June 2023 Application Features Automatic Dynamic Remediation – Rootshell now supports a fully automated end-to-end vulnerability management solution with the ability
June 2023 Release Rootshell Platform’s June release completes our journey to full automation of vulnerability management; adding the ability to
Automate Based on Business Context CVSS scores only tell part of the story of an issue’s severity. Without contextualizing vulnerabilities
CVE-2023-33140. Rootshell RedForce testing team has been credited with the discovery of an exploitable hash stealing vulnerability in Microsoft OneNote.
April 2023 Application Features New Features Automation Centre – Rootshell now supports the creation of automated processes to greatly assist users
Never Miss a Priority Issue Again Rootshell Platform’s Automation Center enables teams to create a range of automation rules that
Previously… Previously, the Rootshell security team discovered several flaws in Data Encryption Systems DESkey hardware kernel drivers. A further issue affects
February 2023 New Features New Level 2 Integration | SentinelOne – Rootshell now supports the uploading and parsing of a csv
Part of our three part series In our three part series on what makes an effective vulnerability management program, we
Author: Liam Hackett, Head of Development AI is the buzzword of the decade. The most downloaded app on IOS and
No one-size-fits-all solutions here! As is the case for any high performing team, the talent and experience of your personnel
Vulnerability Management Program In its simplest form, a vulnerability management program will consist of running scans, distributing results, and remediating
Author: Liam Romanis (Principal Security Consultant) In previous reports for customers whose Microsoft 365 (M365) configurations have allowed Gifs and
Remote Desktop protocol implementation in Microsoft Windows. 2012 saw a spate of vulnerabilities in the Remote Desktop protocol implementation in
Once upon a time… …vendors would be grateful for bug hunters reporting flaws in their software so they could fix
The Rootshell team discovered a critical vulnerability within Avada, the number one best-selling theme on WordPress. Rootshell Security Consultant, Calum
The issue affects drivers associated with the DK[23]USB/B and DK[23]USB/D devices, and potentially others. Rootshell’s Research and Development team have
Log4j vulnerability (CVE-2021-44228). Rootshell Platform is helping clients identify and address systems affected by the Log4j vulnerability (CVE-2021-44228). Log4j is a
Author: Paul Cronin (Partner and Co-Founder) Software Defined Radio (SDR) is not a new subject, however the release of the Flipper
Update: NetLib have released a patch for the NetLib Encryptionizer Platform. Update: NetLib have released a patch for the NetLib
Cyber Security Tips As part of Cyber Security Awareness Month, Rootshell’s VP of Threat Services, Shaun Peapell, is sharing actionable cyber
Update: NetLib have released a patch for the NetLib Encryptionizer Platform. Update: NetLib have released a patch for the NetLib
Debunking: Automated or Manual? Web applications are popular targets for threat actors; vulnerable applications can offer convenient entry points into
Programmers must display absolute accuracy Recently, we spoke about the difficulty of kernel programming; programmers must display absolute accuracy, as a
Not Reading The Documentation Leads To Invalid Patches Kernel programming and driver development are notoriously hard, the primary reason being
Our Team have discovered a second flaw within miniDLNA; a server software that exchanges media files, such as music, images,
A member of our leadership team received a SMiShing (SMS Phishing) message that appeared to be from the Royal Mail,
What is Cyber Essentials Plus? Cyber Essentials PLUS is a UK government-backed certification designed to help protect organizations from common cyber attacks. The assessment provides
The Rootshell Security team have discovered a flaw in Dekart Private Disk; a hard disk encryption software for Windows sold
The Rootshell team have discovered a security issue in KeyScrambler, an anti-keylogger owned by QFX Software, which could enable hackers
Our Team have discovered a Remote Heap Corruption Bug within miniDLNA and Develop Proof of Concept Exploit The Rootshell Security team have discovered a bug
Say goodbye to PDFs It’s likely that data guides nearly every decision of your vulnerability remediation process, yet managing it is
Six ways you can improve your vulnerability remediation process, including how the Rootshell Platform can help. Managing the remediation of
Rootshell Security Research and Development Lead, Dr. Neil Kettle, writes working exploit for Windows DNS vulnerability … and no, you
How to use .Net native tools to run custom binaries Jacob Wilkin | Senior Security Consultant | Rootshell Security Note:
Does backing up your data really count? There seem to be a growing number of data backup services advertising themselves
How to use .Net native tools to run custom binaries Rafael Gil | Senior Penetration Tester | Rootshell Security Windows
2020 COVID-19 Impact Shaun Peapell | Vice President, Threat Services | Rootshell Security The necessary restrictions on physical movement caused