Posts by Jon Isaacson
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by Cleo,...
Read MoreAbout the Author
Jon Isaacson is a cybersecurity consultant with over 15 years of experience in cybersecurity, enterprise software, and U.S. government cyber operations. Prior to founding JTI Cybersecurity, he held several senior technical positions at technology companies and defense contractors. Jon built the product security team for a global surveillance software company, and has designed innovative cybersecurity and surveillance solutions for Fortune 500 companies, casinos, militaries, and governments, and has led infrastructure projects for large ‘bluechip’ customers in verticals including finance, healthcare, transportation, and critical infrastructure.
Subscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.