A Social-able Phish – A Tale of Meta
Author: Paul Cronin, Co-Founder of Rootshell Phishing scammers, we generally assume, will typically use email as their delivery mechanism to […]
Author: Paul Cronin, Co-Founder of Rootshell Phishing scammers, we generally assume, will typically use email as their delivery mechanism to […]
Introduction As global attention converges on high-profile events like the Paris 2024 Olympics, the importance of robust cybersecurity measures cannot
Introduction There are 29.32 billion connected devices in the world today and the number is supposed to go up to 45.72 billion
Author: Paul Cronin, Co-Founder and Partner “You will never find a more wretched hive of scum and villainy.” Obi-Wan warns
Author: Thomas Gomer, Security Consultant at Rootshell. Device implants are tools used within penetration testing that can be used to
Author: Paul Cronin, Co-Founder and Partner Voice recognition technology in assistants has transformed how we interact with our devices, making
Author: Paul Cronin, Co-Founder of Rootshell As a penetration tester, I often found it frustrating that the reports I submitted
Author: Shaun Peapell, VP of Global Threat Services As part of Rootshell’s comprehensive security testing strategies, Wi-Fi network security testing
Author: Liam Hackett, Head of Development and creator of Velma, Rootshell’s own AI. It’s been a year since I last
Contextual Understanding for Informed Decisions: Traditional CVSS scores provide a narrow view of threats. Rootshell tried to solve this problem
CVE-2023-33140. Rootshell RedForce testing team has been credited with the discovery of an exploitable hash stealing vulnerability in Microsoft OneNote.
Previously… Previously, the Rootshell security team discovered several flaws in Data Encryption Systems DESkey hardware kernel drivers. A further issue affects
Author: Liam Romanis (Principal Security Consultant) In previous reports for customers whose Microsoft 365 (M365) configurations have allowed Gifs and
Remote Desktop protocol implementation in Microsoft Windows. 2012 saw a spate of vulnerabilities in the Remote Desktop protocol implementation in
Once upon a time… …vendors would be grateful for bug hunters reporting flaws in their software so they could fix
The Rootshell team discovered a critical vulnerability within Avada, the number one best-selling theme on WordPress. Rootshell Security Consultant, Calum
The issue affects drivers associated with the DK[23]USB/B and DK[23]USB/D devices, and potentially others. Rootshell’s Research and Development team have
Log4j vulnerability (CVE-2021-44228). Rootshell Platform is helping clients identify and address systems affected by the Log4j vulnerability (CVE-2021-44228). Log4j is a
Author: Paul Cronin (Partner and Co-Founder) Software Defined Radio (SDR) is not a new subject, however the release of the Flipper
Update: NetLib have released a patch for the NetLib Encryptionizer Platform. Update: NetLib have released a patch for the NetLib
Update: NetLib have released a patch for the NetLib Encryptionizer Platform. Update: NetLib have released a patch for the NetLib
Programmers must display absolute accuracy Recently, we spoke about the difficulty of kernel programming; programmers must display absolute accuracy, as a
Our Team have discovered a second flaw within miniDLNA; a server software that exchanges media files, such as music, images,
A member of our leadership team received a SMiShing (SMS Phishing) message that appeared to be from the Royal Mail,
The Rootshell Security team have discovered a flaw in Dekart Private Disk; a hard disk encryption software for Windows sold
The Rootshell team have discovered a security issue in KeyScrambler, an anti-keylogger owned by QFX Software, which could enable hackers
Our Team have discovered a Remote Heap Corruption Bug within miniDLNA and Develop Proof of Concept Exploit The Rootshell Security team have discovered a bug
Rootshell Security Research and Development Lead, Dr. Neil Kettle, writes working exploit for Windows DNS vulnerability … and no, you