Skip to content

    Posts by Jon Isaacson

    Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956

    13 min read | December 17, 2024

    What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by Cleo,...

    Read More

    About the Author

    Jon Isaacson is a cybersecurity consultant with over 15 years of experience in cybersecurity, enterprise software, and U.S. government cyber operations. Prior to founding JTI Cybersecurity, he held several senior technical positions at technology companies and defense contractors. Jon built the product security team for a global surveillance software company, and has designed innovative cybersecurity and surveillance solutions for Fortune 500 companies, casinos, militaries, and governments, and has led infrastructure projects for large ‘bluechip’ customers in verticals including finance, healthcare, transportation, and critical infrastructure.