Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Root Evidence Launches With $12.5 Million in Seed Funding

Posted on July 28, 2025July 28, 2025 By CWS

Cybersecurity startup Root Proof as we speak introduced its launch with $12.5 million raised in an oversubscribed seed spherical led by Ballistic Ventures. Grossman Ventures and others offered extra monetary assist.

Headquartered in Boise, Idaho, Root Proof was based in July 2025 by business veterans Jeremiah Grossman (Chief Government Officer), Robert Hansen (Chief Know-how Officer), Heather Konold (Chief Operations Officer), and Lex Arquette (Chief Product Officer).

Grossman, who co-founded WhiteHat Safety and Bit Discovery along with Arquette, beforehand served as Chief of Safety Technique at SentinelOne. Bit Discovery was acquired by Tenable in 2023.

The startup is creating vulnerability scanning and assault floor administration know-how that’s absolutely built-in and which depends on exploitation proof to assist organizations give attention to addressing these vulnerabilities which can be focused within the wild.

In line with Root Proof, its resolution permits safety groups to prioritize remediation efforts on the lower than 1% of safety defects that matter, cut back the chance of a breach, and calculate the monetary dangers.

Root Proof takes an evidence-based method to safety, prioritizing choices utilizing sturdy proof of threat, as a substitute of scanning an inventory of flaws recognized to be exploited or counting on a severity scoring system.

“Success in vulnerability administration is not about who can report essentially the most theoretical vulnerabilities, irrespective of how technically extreme. Organizations want proof, with proof, of which vulnerabilities are recognized to trigger essentially the most harm if left unaddressed, to give attention to remediating these first. That’s what Root Proof does,” Root Proof CTO Robert Hansen mentioned.

Associated: HeroDevs Raises $125 Million to Safe Deprecated OSSAdvertisement. Scroll to proceed studying.

Associated: Valarian Luggage $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

Associated: Community Entry Vendor Portnox Secures $37.5 Million Funding

Associated: Serial Entrepreneurs Increase $43M to Counter AI Deepfakes, Social Engineering

Security Week News Tags:Evidence, Funding, Launches, Million, Root, Seed

Post navigation

Previous Post: Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
Next Post: Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

Related Posts

Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security Security Week News
Cybercriminals Claim Theft of Data From Oracle E-Business Suite Customers Security Week News
SAP Patches Another Critical NetWeaver Vulnerability Security Week News
US Sanctions Philippine Company for Supporting Crypto Scams Security Week News
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison Security Week News
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics
  • Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT
  • Emerging Cyber Threats Featuring QR Codes ClickFix and LOLBins Challenging SOC Defenses
  • New Gentlemen’s RaaS Advertised on Hacking Forums Targeting Windows, Linux and ESXi Systems
  • Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics
  • Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT
  • Emerging Cyber Threats Featuring QR Codes ClickFix and LOLBins Challenging SOC Defenses
  • New Gentlemen’s RaaS Advertised on Hacking Forums Targeting Windows, Linux and ESXi Systems
  • Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News