Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Root Evidence Launches With .5 Million in Seed Funding

Root Evidence Launches With $12.5 Million in Seed Funding

Posted on July 28, 2025July 28, 2025 By CWS

Cybersecurity startup Root Proof as we speak introduced its launch with $12.5 million raised in an oversubscribed seed spherical led by Ballistic Ventures. Grossman Ventures and others offered extra monetary assist.

Headquartered in Boise, Idaho, Root Proof was based in July 2025 by business veterans Jeremiah Grossman (Chief Government Officer), Robert Hansen (Chief Know-how Officer), Heather Konold (Chief Operations Officer), and Lex Arquette (Chief Product Officer).

Grossman, who co-founded WhiteHat Safety and Bit Discovery along with Arquette, beforehand served as Chief of Safety Technique at SentinelOne. Bit Discovery was acquired by Tenable in 2023.

The startup is creating vulnerability scanning and assault floor administration know-how that’s absolutely built-in and which depends on exploitation proof to assist organizations give attention to addressing these vulnerabilities which can be focused within the wild.

In line with Root Proof, its resolution permits safety groups to prioritize remediation efforts on the lower than 1% of safety defects that matter, cut back the chance of a breach, and calculate the monetary dangers.

Root Proof takes an evidence-based method to safety, prioritizing choices utilizing sturdy proof of threat, as a substitute of scanning an inventory of flaws recognized to be exploited or counting on a severity scoring system.

“Success in vulnerability administration is not about who can report essentially the most theoretical vulnerabilities, irrespective of how technically extreme. Organizations want proof, with proof, of which vulnerabilities are recognized to trigger essentially the most harm if left unaddressed, to give attention to remediating these first. That’s what Root Proof does,” Root Proof CTO Robert Hansen mentioned.

Associated: HeroDevs Raises $125 Million to Safe Deprecated OSSAdvertisement. Scroll to proceed studying.

Associated: Valarian Luggage $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

Associated: Community Entry Vendor Portnox Secures $37.5 Million Funding

Associated: Serial Entrepreneurs Increase $43M to Counter AI Deepfakes, Social Engineering

Security Week News Tags:Evidence, Funding, Launches, Million, Root, Seed

Post navigation

Previous Post: Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
Next Post: Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

Related Posts

Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week Security Week News
Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Security Week News
Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore Security Week News
Sandworm Mode: New NPM Supply Chain Attack Uncovered Sandworm Mode: New NPM Supply Chain Attack Uncovered Security Week News
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to  Million NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million Security Week News
Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark