Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  Rootshell Security technology Blog  > 

Keyloggers: Part 1
2024-04-22 12:26
Author: Thomas Gomer, Security Consultant at Rootshell. Device implants are tools used within penetration testing that can be used to stealthily record, input and exfiltrate information. The… Read More
Phishing: Slipping The Net
2024-03-18 14:39
Author: Andrew Stanistreet, Security Consultant Managed Services Welcome to the second post in my phishing series, in the first I briefly touched on some different types of phishing such as… Read More
Understanding CMMC 2.0 In Cybersecurity
2024-03-13 09:27
Cybersecurity has to adapt to evolving threats. You need fresh approaches, certifications, and frameworks to constantly keep up with emerging technologies and attack vectors. One such framew… Read More
The Significance Of SLAs In Cybersecurity
2024-03-07 16:18
As a business, you have always had to worry about cyber threats. However, attacks in the past were more like a wide net cast. The problem now is that threat actors use AI to create more pers… Read More
What Is Red Team In Cyber Security?
2024-02-21 11:22
What Is Red Team in Cyber Security? If you’re looking into ways of protecting your business from cyber attacks, you may have come across the term ‘red team’. But, what is a… Read More
Threat Intelligence
2024-02-16 14:31
Organisations are constantly grappling with the challenge of detecting and preventing cybersecurity threats in today’s digital age. Of the many tools that people use, threat intelligen… Read More
Customisable SLA Email And Project Velma
2023-11-03 09:02
We are excited to announce the latest update to the platform, packed with new features, significant improvements, and groundbreaking operational additions designed to elevate your cybersecur… Read More
2023-10-11 15:16
In 2023, staying ahead of evolving threats is paramount. At Rootshell Security, we understand the critical need to not only grasp the current industry landscape but also to anticipate emergi… Read More
2023-10-11 14:08
In today’s dynamic business landscape, safeguarding critical assets is paramount. Every organization operates within a digital realm, and within this realm lies a trove of valuable dat… Read More
Vulnerability Management SLA
2023-10-11 08:37
In 2023 the digital landscape, where cyber threats loom large and security breaches are a constant concern, an effective vulnerability management program is crucial for safeguarding your org… Read More
Automated Vulnerability Management
2023-08-31 15:13
What is Automated Vulnerability Management?At its core, vulnerability management is the ongoing practice of identifying, classifying, and mitigating vulnerabilities within an organization&rs&hell…Read More
AI: Friend Or Foe?
2023-08-30 10:57
Author: Liam Hackett, Head of Development and creator of Velma, Rootshell’s own AI. It’s been a year since I last wrote about AI. Since then, we’ve seen an explosion in AI… Read More
Patch Tuesday Review – June 2023
2023-06-14 08:41
Welcome to our summary of the June 2023 Microsoft Patch Tuesday. We have tabulated the vulnerabilities that the latest patches from Microsoft fix, so that you can easily export them for use… Read More
Patch Tuesday Review – May 2023
2023-05-10 07:25
Welcome to our summary of the May 2023 Microsoft Patch Tuesday. We have tabulated the vulnerabilities that the latest patches from Microsoft fix, so that you can easily export them for use i… Read More
Patch Tuesday Review – April 2023
2023-04-12 07:52
Welcome to our summary of the April 2023 Microsoft Patch Tuesday. We have tabulated the vulnerabilities that the latest patches from Microsoft fix, so that you can easily export them for use… Read More
Patch Tuesday Review – March 2023
2023-02-01 09:15
Welcome to our summary of the March 2023 Microsoft Patch Tuesday. We have tabulated the vulnerabilities that the latest patches from Microsoft, so that you can easily export them for use in… Read More
Patch Tuesday Review – February 2023
2023-02-01 09:15
Welcome to our summary of the first Patch Tuesday of the year (January 2023). We have tabulated the vulnerabilities that the latest patches from Microsoft, so that you can easily export them… Read More
Vulnerability Management Automation
2023-01-13 10:13
Cyber criminals are constantly looking for ways to exploit any weaknesses in a business’ digital infrastructure, which is why it has become increasingly important to defend against cyb… Read More
Patch Tuesday Review – January 2023
2023-01-11 09:06
Welcome to our summary of the first Patch Tuesday of the year (January 2023). We have tabulated the vulnerabilities that the latest patches from Microsoft, so that you can easily export them… Read More
Patch Tuesday Review – December 2022
2022-12-14 09:10
Welcome to our summary of the final Patch Tuesday of the year (December 2022). We have tabulated the vulnerabilities that the latest patches from Microsoft, so that you can easily export the… Read More

Share the post

Rootshell Security

×

Subscribe to Rootshell Security

Get updates delivered right to your inbox!

Thank you for your subscription

×