Posts by Mike Toole
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
13 min read
| December 17, 2024
What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by Cleo,...
Read More
Compliance Security Frameworks and Insurance
6 min read
| August 22, 2024
Navigating the FTC Safeguards Rule: A Guide for Auto Dealerships
Read More
Compliance Security Frameworks and Insurance
8 min read
| August 15, 2024
4 key steps to building an incident response plan
Read More
Security Trends and Info
6 min read
| August 13, 2024
Securing Our Water Supply: Cybersecurity Strategies for Treatment Plants
Read More
Security Trends and Info
6 min read
| August 12, 2024
Five Steps to Overcoming Cyber Complacency
Read More
Security Alerts
3 min read
| December 8, 2023
This Vuln: DeleFriend
Read More
Security How-To
19 min read
| December 23, 2022
How To Use Nmap To Scan For Open Ports
Read More
Security Alerts
3 min read
| March 14, 2022
Vulnerabilities (CVE-2022-26500, 2022-26501) in Veeam
Read More
Security Alerts
5 min read
| February 16, 2022
Google Patches Chrome Zero-Day (CVE-2022-0609)
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.