Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Root Evidence Launches With $12.5 Million in Seed Funding

Posted on July 28, 2025July 28, 2025 By CWS

Cybersecurity startup Root Proof as we speak introduced its launch with $12.5 million raised in an oversubscribed seed spherical led by Ballistic Ventures. Grossman Ventures and others offered extra monetary assist.

Headquartered in Boise, Idaho, Root Proof was based in July 2025 by business veterans Jeremiah Grossman (Chief Government Officer), Robert Hansen (Chief Know-how Officer), Heather Konold (Chief Operations Officer), and Lex Arquette (Chief Product Officer).

Grossman, who co-founded WhiteHat Safety and Bit Discovery along with Arquette, beforehand served as Chief of Safety Technique at SentinelOne. Bit Discovery was acquired by Tenable in 2023.

The startup is creating vulnerability scanning and assault floor administration know-how that’s absolutely built-in and which depends on exploitation proof to assist organizations give attention to addressing these vulnerabilities which can be focused within the wild.

In line with Root Proof, its resolution permits safety groups to prioritize remediation efforts on the lower than 1% of safety defects that matter, cut back the chance of a breach, and calculate the monetary dangers.

Root Proof takes an evidence-based method to safety, prioritizing choices utilizing sturdy proof of threat, as a substitute of scanning an inventory of flaws recognized to be exploited or counting on a severity scoring system.

“Success in vulnerability administration is not about who can report essentially the most theoretical vulnerabilities, irrespective of how technically extreme. Organizations want proof, with proof, of which vulnerabilities are recognized to trigger essentially the most harm if left unaddressed, to give attention to remediating these first. That’s what Root Proof does,” Root Proof CTO Robert Hansen mentioned.

Associated: HeroDevs Raises $125 Million to Safe Deprecated OSSAdvertisement. Scroll to proceed studying.

Associated: Valarian Luggage $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

Associated: Community Entry Vendor Portnox Secures $37.5 Million Funding

Associated: Serial Entrepreneurs Increase $43M to Counter AI Deepfakes, Social Engineering

Security Week News Tags:Evidence, Funding, Launches, Million, Root, Seed

Post navigation

Previous Post: Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
Next Post: Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

Related Posts

US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed Security Week News
Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning Security Week News
Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking Security Week News
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking Security Week News
Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News