Posts by Jim Simpson
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
13 min read
| December 17, 2024
What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by Cleo,...
Read More
Security Trends and Info
5 min read
| October 16, 2024
Human-Centric Security: Five Strategies For A Collaborative Approach
Read More
Manufacturing
7 min read
| July 17, 2024
Four Cornerstones Of Cyber Resilience In Modern Manufacturing
Read More
Security Trends and Info
6 min read
| April 15, 2024
Building A Cyber-Aware Company Culture: Make It A Team Effort
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.