A Social-able Phish – A Tale of Meta
Phishing scammers, we generally assume, will typically use email as their delivery mechanism to their target audience. The scattergun approach […]
Phishing scammers, we generally assume, will typically use email as their delivery mechanism to their target audience. The scattergun approach […]
Introduction As global attention converges on high-profile events like the Paris 2024 Olympics, the importance of robust cybersecurity measures cannot
Introduction There are 29.32 billion connected devices in the world today and the number is supposed to go up to 45.72 billion
“You will never find a more wretched hive of scum and villainy.” Obi-Wan warns Luke to keep his wits about
Device implants are tools used within penetration testing that can be used to stealthily record, input and exfiltrate information. The
Voice recognition technology in assistants has transformed how we interact with our devices, making daily tasks quicker and more convenient.
As a penetration tester, I often found it frustrating that the reports I submitted became outdated as vulnerabilities I reported
As part of Rootshell’s comprehensive security testing strategies, Wi-Fi network security testing plays a fundamental role in the overall pursuit
It’s been a year since I last wrote about AI. Since then, we’ve seen an explosion in AI tools and applications.
Contextual Understanding for Informed Decisions: Traditional CVSS scores provide a narrow view of threats. Rootshell tried to solve this problem
CVE-2023-33140. Rootshell RedForce testing team has been credited with the discovery of an exploitable hash stealing vulnerability in Microsoft OneNote.
Previously… Previously, the Rootshell security team discovered several flaws in Data Encryption Systems DESkey hardware kernel drivers. A further issue affects
In previous reports for customers whose Microsoft 365 (M365) configurations have allowed Gifs and Memes, it has been recommended that
Remote Desktop protocol implementation in Microsoft Windows. 2012 saw a spate of vulnerabilities in the Remote Desktop protocol implementation in
Once upon a time… …vendors would be grateful for bug hunters reporting flaws in their software so they could fix
The Rootshell team discovered a critical vulnerability within Avada, the number one best-selling theme on WordPress. Rootshell Security Consultant, Calum
The issue affects drivers associated with the DK[23]USB/B and DK[23]USB/D devices, and potentially others. Rootshell’s Research and Development team have
Log4j vulnerability (CVE-2021-44228). Rootshell Platform is helping clients identify and address systems affected by the Log4j vulnerability (CVE-2021-44228). Log4j is a
Software Defined Radio (SDR) is not a new subject, however the release of the Flipper Zero has recaptured my interest in the
Update: NetLib have released a patch for the NetLib Encryptionizer Platform. Update: NetLib have released a patch for the NetLib
Update: NetLib have released a patch for the NetLib Encryptionizer Platform. Update: NetLib have released a patch for the NetLib
Programmers must display absolute accuracy Recently, we spoke about the difficulty of kernel programming; programmers must display absolute accuracy, as a
Our Team have discovered a second flaw within miniDLNA; a server software that exchanges media files, such as music, images,
A member of our leadership team received a SMiShing (SMS Phishing) message that appeared to be from the Royal Mail,
The Rootshell Security team have discovered a flaw in Dekart Private Disk; a hard disk encryption software for Windows sold
The Rootshell team have discovered a security issue in KeyScrambler, an anti-keylogger owned by QFX Software, which could enable hackers
Our Team have discovered a Remote Heap Corruption Bug within miniDLNA and Develop Proof of Concept Exploit The Rootshell Security team have discovered a bug
Rootshell Security Research and Development Lead, Dr. Neil Kettle, writes working exploit for Windows DNS vulnerability … and no, you