Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/21/2017
06:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cybersecurity Firm root9B's Assets Up for Sale

Move to foreclose comes after company defaulted on repayment terms for over $10.7 millions in loans it owes creditors.

Colorado Springs, Colo-based, root9B Holdings, a publicly traded security company (RTNB) led by several former US Department of Defense cybersecurity officials, appears to be on the verge of going out of business.

Creditors seeking to collect on the nearly $10.7 million the company owes them are scheduled to auction off almost all of root9B Holdings' assets and properties on August 31. The proposed foreclosure action comes after root9B defaulted on the borrowing terms of its secured debt, the company said in a statement released Friday.

Root8B Holdings is continuing to work with creditors and other potential investors to raise the capital needed to pay off the debt. But there is no assurance that the company will be able to raise the money in time, said Joseph Grano, root9B Holdings' non-executive chairman of board, former CEO and an individual investor in the secured debt.

"We are disappointed with the foreclosure notice," said Grano, who was chairman of the Homeland Security Advisory Council between 2002 and 2005.

In a Form 8-K filed with the Securities and Exchange Commission (SEC) last week, root9B Holdings said it will try and obtain a waiver from its creditors so it can have additional time to "seek other forms of liquidity and explore restructuring alternatives."

One of those potential alternatives includes working with the Chertoff Group, an advisory firm founded by former DHS Secretary Michael Chertoff. In the event such efforts fail, the creditors will seize and sell substantially all of root9B's assets, the SEC filing noted. Such a development would render the company's stock potentially worthless, root9B warned investors.

Already, the company's stock has dropped from $4.09 on August 9to $1.26 August 21. Even that is double the 60 cents or so to which it dropped last Thursday after news first emerged of the company's financial problems. Last Friday, trading in the stock was so volatile that five-minute halts on trading were imposed a total of 16 times.

The security company bills itself as a provider of a wide range of cybersecurity services including vulnerability assessment, penetration testing, cyber forensics and evidence collecting, SCADA security operations, and compliance testing. It claims customers from within the Fortune 100 list as well as those in the small- to midsized business sectors.

Its board of advisors includes heavyweights like former NYSE chairman and CEO Richard Grasso, former director of US Secret Service Lewis Merletti, former CIA director General Michael Hayden, and Judge William Webster, former FBI director.

Prior to root9B Holdings' announcement of the pending foreclosure, Cybersecurity Ventures had ranked root9B as the hottest and most innovative cybersecurity company for 2017 - ahead of others like Palo Alto Networks and Raytheon Cyber. So far, Cybersecurity Ventures has picked root9B as the cybersecurity industry's hottest and most innovative company six quarters in row.

For the first quarter of 2017 ended March 31, root9B Holdings announced an operating loss of $3.8 million on revenues of $2.7 million. The company's net revenues for 2016, was around $10 million from over $11 million in the year before. The company reported loss from continuing operations of over $18 million last year compared to a loss of $8 million in 2015. At the end of last year, root9B employed about 80 employees.

Over the past year or so, the company has been divesting itself of other businesses including those in the control engineering and energy businesses to focus entirely on cybersecurity.

In 2015, several investors sued the company for making false and misleading claims about its cybersecurity offerings and its performance. That class action lawsuit was later dismissed with prejudice in 2016. Technology blog Seeking Alpha once described the company as a "worthless reverse-merger" with a miniscule and imploding cyber business.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
cologic
50%
50%
cologic,
User Rank: Apprentice
11/5/2017 | 7:07:46 AM
Cybersecurity Ventures and its rating system
RE Prior to root9B Holdings' announcement of the pending foreclosure, Cybersecurity Ventures had ranked root9B as the hottest and most innovative cybersecurity company for 2017 - ahead of others like Palo Alto Networks and Raytheon Cyber. So far, Cybersecurity Ventures has picked root9B as the cybersecurity industry's hottest and most innovative company six quarters in row.

Cybersecurity Ventures will place your organization anywhere on the list, depending on how much you are willing to pay.
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.