From Phishing to Phish and Chips
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
As part of his Phishing blog series, Andrew Stanistreet discusses his new challenge and the surprising overlap he’s found with cyber security.
Vulnerability and penetration testing services are two types of cyber security assessments. They differ in breadth, depth, scope, and serve different
Threat and vulnerability management involves identifying, analysing, prioritizing, and remediating weaknesses in an organization’s network. Ensuring that threat and vulnerability management
Cyber threats are growing in number and sophistication, with cybercrime damage expected to reach $10.5 Trillion by 2025. As such, there
It’s easy to think that cybersecurity is limited to the digital space. It’s right there in the name, if you
For an enterprise, penetration testing and vulnerability scanning are both essential methods for protecting systems and networks from cyber attacks.
In this digital age, both individuals and organizations face significant threats from cyber attacks. Cybercriminals are continually evolving their attacking strategies to
Penetration testing, or pen testing, is a crucial security exercise for organizations to identify vulnerabilities in their defense mechanism thereby
Discover the essentials of automated penetration testing and its role in enhancing cyber security strategies with Rootshell Security. In light
Author: Paul Cronin, Co-Founder Introduction A good friend of mine recently told me of the horror of him trying to
Introduction As global attention converges on high-profile events like the Paris 2024 Olympics, the importance of robust cybersecurity measures cannot
Author: Shaun Peapell, VP of Global Threat Services, Rootshell Security Rootshell have developed a reporting capability aligned to ‘The MITRE
MITRE ATT&CK® Framework At Rootshell Security, we are continuously seeking ways to advance our cybersecurity tools and methodologies. We are
Author: Paul Cronin, Co-Founder and Partner Voice recognition technology in assistants has transformed how we interact with our devices, making
Author: Andrew Stanistreet, Security Consultant Managed Services Welcome to the second post in my phishing series, in the first I
Author: Andrew Stanistreet, Security Consultant Managed Services Flavours of Phishing In this first post of this blog series, I want
Author: Paul Cronin, Co-Founder of Rootshell As a penetration tester, I often found it frustrating that the reports I submitted
Author: Shaun Peapell, VP of Global Threat Services As part of Rootshell’s comprehensive security testing strategies, Wi-Fi network security testing
Author: Shaun Peapell, VP of Global Threat Services The cyber security world is an ever-evolving landscape, staying one step ahead
Author: Shaun Peapell, VP of Global Threat Services As a mature Red Team and Simulated Attack house, we often look
Debunking: Automated or Manual? Web applications are popular targets for threat actors; vulnerable applications can offer convenient entry points into
Not Reading The Documentation Leads To Invalid Patches Kernel programming and driver development are notoriously hard, the primary reason being
How to use .Net native tools to run custom binaries Jacob Wilkin | Senior Security Consultant | Rootshell Security Note:
How to use .Net native tools to run custom binaries Rafael Gil | Senior Penetration Tester | Rootshell Security Windows