Sitemap
Pages
- About Us
- Accreditations
- Aerospace & Defence
- AI Penetration Testing
- Attack Surface Management
- Attack Surface Management Solutions
- Become A Partner
- Blog
- Book A Demo
- Breach and Attack Simulation (BAS)
- Careers
- Cloud Services Penetration Testing
- Construction & Manufacturing
- Contact us
- Continuous Attack Surface Management
- Continuous Penetration Testing
- Continuous Threat Exposure Management
- Cookie Policy
- Cyber Threat Intelligence Services
- Education
- Energy & Utilities
- Exploit Center
- External Attack Surface Management
- External Attack Surface Management (EASM)
- Financial Services
- Firewall Penetration Testing
- Gambling & Gaming
- Government
- Healthcare
- Home
- Infrastructure Penetration Testing
- Insurance
- Integrations
- Legal
- Leveraging CISA Known Exploited Vulnerabilities Catalog to Fortify Cybersecurity
- Managed Vulnerability Scanning (MVS)
- Media
- Next Generation Continuous Vulnerability Management
- Partner Newsletter
- Penetration Testing as a Service
- Penetration Testing Cloud Services
- Penetration Testing Services
- Pharmaceuticals
- Phishing Assessment
- Platform
- Platform Active Exploit Detection
- Platform Automation
- Platform Remedation & Collaboration
- Platform Videos
- Privacy Policy
- Privacy Policy
- Ransomware Assessments
- Red Team as a Service
- Register an opportunity
- Retail & Ecommerce
- Sitemap
- Strategic Threat Intelligence
- Success Stories
- Support
- Telecommunications
- Terms & Conditions
- The Importance of External Penetration Testing
- Transport & Logistics
- VMMM Calculator
- Vulnerability Assessment and Penetration Testing Services
- Vulnerability Management
- Web Application Penetration Testing Services
- Web Application Scanning
- What is PTaaS (Penetration Testing as a Service)?
- White Label Penetration Testing
- Why Partner With Us?
- Why Rootshell Security
- Wireless Penetration Testing
Posts by category
- Category: Uncategorized
- What is Social Engineering in Cybersecurity?
- Vulnerability Intelligence: How to Integrate it With Your Program
- Threat Intelligence
- Outcome Driven Metrics: Measuring What Matters in Cybersecurity
- Essential Generative AI Trends for 2024
- MFA Service Accounts in Azure and Microsoft 365
- Is Data Backup Cybersecurity?
- Category: Attack surface managment
- Category: Penetration testing
- Vulnerability and Penetration Testing Services
- Is Your Threat and Vulnerability Management Process Up To Scratch?
- The Importance of External Penetration Testing
- What is Physical Penetration Testing?
- Penetration Testing vs Vulnerability Scanning
- How to Prevent Cyber Attacks
- AWS Penetration Testing: Methodology and Guidelines
- Automated Penetration Testing: Benefits and Limitations
- Gold Medal Cybersecurity: Paris Olympics 2024
- MITRE ATT&CK Framework: Aligned Assessments, Management and Reporting
- Elevating Cybersecurity: Rootshell Security Introduces MITRE ATT&CK Framework Integration
- Voice Assistants: Navigating the Digital Soundscape Safely
- Phishing: Slipping The Net
- Phishing: Inside The Attacker’s Tacklebox
- Vulnerability Data: Informed Decisions using AI
- Strengthening Wi-Fi Networks: Addressing Security Concerns and Recommendations
- Transforming Red Team Assessments: The Impact of AI
- Safeguarding Against SMSishing Attacks: Best Practices for Protection
- Web Application Security Testing Debunked
- Kernel Developers Be Warned!
- ntlm_theft: A Tool For File Based Forced ntlm Hash Disclosure
- Application Whitelisting Bypass Using .Net
- Category: Physical testing
- Unlock Enhanced Performance and Efficiency with our New Archiving Feature and Custom Import Frequency
- Car Security Updates: Who’s Responsible?
- Hunting For Vulnerabilities: A Technical Journey & Analysis of Wireless Burglar Alarms
- Breaking the Barrier: An Exploration of Physical Door Attacks
- Surfing and Security: The Challenge of Keeping Your Van Safe
- Category: Vulnerability management
- What is Vulnerability Management?
- What Is Red Team in Cyber Security? Red Team vs Blue Team
- Attack Surface Analysis: Identifying, Mapping and Managing Attack Surface
- Vulnerability Scanning Service vs In-House Scanning
- Vulnerability Remediation
- Vulnerability Remediation Tracker
- The Benefits of Vulnerability Remediation Management Tools
- Vulnerability Management Trends
- Vulnerability Management System: How to Choose the Best Solution for Your Organization
- Vulnerability Management SLA
- Vulnerability Management Reports
- How Effective is Your Vulnerability Management Program?
- Vulnerability Management Process
- Vulnerability Management Process Flow Chart
- Vulnerability Management Prioritization
- Vulnerability Management Metrics
- Vulnerability Management Maturity Model
- Vulnerability Management Dashboard
- Vulnerability Management Lifecycle
- Vulnerability Management Best Practices
- Vulnerability Management Automation
- Vulnerability Management as a Service
- Risk Based Vulnerability Management
- What is Cyber Security Risk Management?
- Cloud Vulnerability Management
- Automated Vulnerability Management
- Our new website is now live!
- Velma’s KEV Report – May 2024
- Auto-Dynamic Remediation Makes Rootshell Fully-Automated Vulnerability Management Platform
- Rootshell’s Automation Center Ensures You Never Miss a Critical Issue Again
- The Technology Behind Highly Effective Vulnerability Management Programs
- AI in Software Development: Gimmick or Gamechanger?
- What Makes a Successful Vulnerability Management Team?
- The Processes Behind a Highly Effective Vulnerability Management Program
- How Rootshell Platform is Helping Address the Log4j Vulnerability
- How Remediation Platforms Are Reinventing Data Handling
- 6 Ways to Improve your Vulnerability Remediation Process
- Category: Audit
- Category: Platform
- Rootshell Platform – Patch Notes November 2024
- Rootshell Platform – Patch Notes September 23
- Rootshell Platform – Patch Notes September 2024
- Introducing Our Latest Platform Enhancements – July 2024
- Unlock Enhanced Performance and Efficiency with our New Archiving Feature and Custom Import Frequency
- Rootshell Platform – Patch Notes July 2024
- Elevating Security with Precision: Introducing Asset Level ACLs
- Elevate Your Web App Security and Control with Qualys WAS Reports Integration & Auto DR
- Unveiling Public API v1: A New Era for Channel Partners
- Unleashing New Possibilities: Introducing Public API v1
- Expanding Our Platform Capabilities Like Never Before: May Release
- Rootshell Platform – Patch Notes May 2024
- Empowering Cybersecurity Excellence: Unveiling New Operational and Partner Features
- Game Changers: CVSSv4 Scoring Integration and Enhanced Asset Management
- Exploring the New Horizons: Black Kite, TopDesk, and Featurette Module Integration
- Rootshell Platform – Patch Notes February 2024
- Platform Improvements: Nessus, Qualys and Burp
- Vulnerability Correlation Database and Enhanced Tenant Overview
- Customisable SLA Email and Project Velma
- Rootshell Platform – Patch Notes November 23
- Velma Threat AI: Enhanced Threat Intelligence for Proactive Defense
- Rootshell Platform – Patch Notes June 23
- Automate Based on Business Context with Rootshell’s Powerful Automation Centre
- Rootshell Platform – Patch Notes April 23
- Rootshell Platform – Patch Notes February
- Category: Compliance
- Quick Guide to DORA Compliance
- The Significance of SLAs in Cybersecurity
- What is the Digital Operational Resilience Act (DORA)?
- Complete Guide to CMMC 2.0 Requirements for Government Contractors
- Understanding CMMC 2.0 in Cybersecurity
- U.S. Department of Defense Cybersecurity Maturity Model Certification (CMMC)
- Rootshell Successfully Renews FSQS Accreditation
- 3 Simple Cyber Security Tips That Everyone Should Implement
- How to Prepare for Cyber Essentials PLUS
- UK Government Suspends Cyber Security Requirements for Suppliers
- Category: Exploits
- A Social-able Phish – A Tale of Meta
- CVE: Common Vulnerabilities and Exposures
- Organised Crime Using Meta Facebook Market Place
- Keyloggers: Part 1
- AI: Friend or Foe?
- Rootshell’s RedForce Team Discover Exploitable Vulnerability in Microsoft OneNote
- Rootshell Research Team Discover Zemana Antilogger Security Flaws
- GIFShell: Beware of Malware!
- MS12-020: The Case of the Harmful Copy and Paste
- The Fortinet FortiClient VPN Bug That Isn’t
- Rootshell Discovered a Critical Vulnerability in Top WordPress Theme
- Rootshell Discover An Arbitrary Code Execution Flaw In DESkey’s Devices
- Hacking a Tesla and Honda with Radio Frequency Manipulation
- Rootshell Discover More Flaws in NetLib Security’s Encryption Products
- Rootshell Discover a Denial of Service Flaw in NetLib Security’s Encryptionizer Platform
- Apple Vulnerability That Was Solved By A Bug
- Rootshell Discover a Second Remotely Exploitable Bug
- SMiShing Attacks: Could this Royal Mail Spoof have Fooled You?
- Rootshell Discover a Denial of Service Flaw
- Rootshell Discover KeyScrambler Security Flaw
- Rootshell Discover Remote Heap Corruption Bug
- Working Exploit for the Windows DNS Vulnerability
- Category: Channel Partners
- Category: Accreditations
Exploit Center
- Velma’s KEV Report - December 2024
- Velma’s KEV Report - November 2024
- Velma’s KEV Report - October 2024
- Velma’s KEV Report - September 2024
- Velma’s KEV Report - August 2024
- Velma’s KEV Report - June & July 2024
- Velma’s KEV Report - May 2024
- Velma’s Top Active Exploits – April 2024
- Velma’s Top Active Exploits – March 2024
- Velma’s Top Active Exploits – February 2024
- Velma’s Top Active Exploits – January 2024
- Velma’s Top Active Exploits – November 2023
- Velma’s Top Active Exploits – October 2023
- Velma’s Top Active Exploits – September 2023
- Velma’s Top Active Exploits – August 2023
- Velma’s Top Active Exploits – January 2023
Success Story
- Improving vulnerability management for Sphere’s remote global team
- Improving and Streamlining the Management of Multiple Security Assessments and Accelerating Remediation for Zinc
- Empowering and strengthening trainline’s cybersecurity
- Consolidating Regional Security Data to Accelerate Remediation for a Global Luxury Retailer
Platform Videos
- Rootshell Platform demo video 2024
- July 2024 release - Rootshell Platform
- May 2024 release - Rootshell Platform
- Rootshell Platform - February 2024 release
- Rootshell Platform - Nov 2023 release