Blumira Blog
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
13 min read
| December 17, 2024
What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by Cleo,...
Read More
Security How-To
2 min read
| January 15, 2025
[Webinar] Resilient Relationship Security: Reduce Lost Connections
Read More
Security How-To
1 min read
| January 14, 2025
Normalizing Security Culture: Don't Have to Get Ready if You Stay Ready
Read More
Security Alerts
17 min read
| January 8, 2025
SonicWall Discloses Multiple Vulnerabilities Including a High Severity Authentication Bypass Flaw
Read More
Customer Success Stories
7 min read
| January 6, 2025
Customer Story: District of Sparwood
Read More
4 min read
| January 6, 2025
What Security Teams Get Wrong About Log Management and How to Fix It
Read More
Blog
5 min read
| January 3, 2025
Microsoft Defender for Cloud Apps: Integrate with Blumira SIEM
Read More
Product Updates
11 min read
| January 2, 2025
November 2024 Product Release Notes
Read More
3 min read
| December 17, 2024
Meet Amanda Berlin: Making Enterprise Security Accessible for All
Read More
Security Alerts
13 min read
| December 17, 2024
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
Read More
Security Trends and Info
4 min read
| December 16, 2024
Unraveling Cybersecurity: From Virus Hunters to Intelligent Defenders
Read More
Security Alerts
11 min read
| December 12, 2024
SonicWall Advisory Reveals Two Unauthenticated Remote Code Execution Vulnerabilities
Read More
SIEM XDR
5 min read
| December 11, 2024
Manual vs Automated Security Visibility for Resource-Constrained Teams
Read More
Security How-To
2 min read
| December 10, 2024
On-Demand - Detection and Response Decoded: From AV to XDR
Read More
Security Trends and Info
5 min read
| December 10, 2024
From Blind Spots to Insights: IT Security IT Visibility
Read More
Blog
7 min read
| December 5, 2024
Protect Your Microsoft 365 Ecosystem from Third-Party App Risks
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.