Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Root Evidence Launches With $12.5 Million in Seed Funding

Posted on July 28, 2025July 28, 2025 By CWS

Cybersecurity startup Root Proof as we speak introduced its launch with $12.5 million raised in an oversubscribed seed spherical led by Ballistic Ventures. Grossman Ventures and others offered extra monetary assist.

Headquartered in Boise, Idaho, Root Proof was based in July 2025 by business veterans Jeremiah Grossman (Chief Government Officer), Robert Hansen (Chief Know-how Officer), Heather Konold (Chief Operations Officer), and Lex Arquette (Chief Product Officer).

Grossman, who co-founded WhiteHat Safety and Bit Discovery along with Arquette, beforehand served as Chief of Safety Technique at SentinelOne. Bit Discovery was acquired by Tenable in 2023.

The startup is creating vulnerability scanning and assault floor administration know-how that’s absolutely built-in and which depends on exploitation proof to assist organizations give attention to addressing these vulnerabilities which can be focused within the wild.

In line with Root Proof, its resolution permits safety groups to prioritize remediation efforts on the lower than 1% of safety defects that matter, cut back the chance of a breach, and calculate the monetary dangers.

Root Proof takes an evidence-based method to safety, prioritizing choices utilizing sturdy proof of threat, as a substitute of scanning an inventory of flaws recognized to be exploited or counting on a severity scoring system.

“Success in vulnerability administration is not about who can report essentially the most theoretical vulnerabilities, irrespective of how technically extreme. Organizations want proof, with proof, of which vulnerabilities are recognized to trigger essentially the most harm if left unaddressed, to give attention to remediating these first. That’s what Root Proof does,” Root Proof CTO Robert Hansen mentioned.

Associated: HeroDevs Raises $125 Million to Safe Deprecated OSSAdvertisement. Scroll to proceed studying.

Associated: Valarian Luggage $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

Associated: Community Entry Vendor Portnox Secures $37.5 Million Funding

Associated: Serial Entrepreneurs Increase $43M to Counter AI Deepfakes, Social Engineering

Security Week News Tags:Evidence, Funding, Launches, Million, Root, Seed

Post navigation

Previous Post: Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
Next Post: Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

Related Posts

Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People Security Week News
SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available Security Week News
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Security Week News
AirMDR Raises $15.5 Million for MDR Solution Security Week News
Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach Security Week News
Kosovar Administrator of Cybercrime Marketplace Extradited to US Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Respond to a Data Breach Notification
  • Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access
  • Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads
  • New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials
  • UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Respond to a Data Breach Notification
  • Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access
  • Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads
  • New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials
  • UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News