Posts by Brian Laskowski
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
13 min read
| December 17, 2024
What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by Cleo,...
Read MoreAbout the Author
Brian has 5 years of experience in IT, with prior work including linux systems administration to most recently leading the threat intelligence program at the State of Michigan security operations center. Other areas of focus have included, incident response, threat hunting, memory analysis, adversary emulation, and SOC metrics. Brian currently holds SANS certifications for the GCIH, GCTI, and most recently the GDAT.
Security Alerts
12 min read
| October 11, 2022
Product Update: Duo Detections
Read More
Security Trends and Info
10 min read
| January 11, 2022
SIEM Alerts To Expect During a Pentest
Read More
Security Alerts
10 min read
| June 30, 2021
PrintNightmare (CVE-2021-1675 and CVE 2021-34527) Explained
Read More
Security How-To
22 min read
| June 15, 2021
How To Test Antivirus and EDR Software: A Complete Guide
Read More
Product Updates
7 min read
| April 29, 2021
How To Detect Password Lists With Blumira
Read More
Security How-To
9 min read
| April 5, 2021
How to Detect Web Shells With a SIEM
Read More
Security Alerts
3 min read
| February 24, 2021
Critical VMware vCenter RCE (CVE-2021-21972) Exploits Released
Read More
Security How-To
6 min read
| February 2, 2021
Detecting SolarWinds & Ransomware Attacks With Process Monitoring
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.