Nethanel Gelernter

Nethanel Gelernter

Co-Founder and CTO
Dr. Nethanel Gelernter is IONIX's CTO and Co-Founder. A seasoned security researcher, Nethanel holds a PhD in Computer Science from Bar-Ilan University focused on web application security and new attack vectors. Nethanel’s research field is practical cyber security, with a focus on modern attack vectors. His work has triggered design changes in the some of the most popular web applications. Nethanel’s prior roles include leading the cyber security research and studies department at Israel’s College of Management Academic Studies, consulting on security for various organizations and as a software engineer at Microsoft.

Posted by Nethanel Gelernter

  • Mitel MiCollab NVM CVE

    Exploited! NuPoint Unified Messaging (NPM) Component of Mitel MiCollab

  • Alert: Zero-day vulnerability update for PAN-OS (CVE-2024-0012), an authentication bypass.

    Exploitable! CVE-2024-0012 Authentication Bypass for PAN-OS

  • Security alert: Zero-day vulnerability update for CVE-2024-10924 affecting millions of WordPress sites due to a security plugin flaw.

    CVE-2024-10924 Explained: Security plugin flaw in millions of WordPress sites

  • Ionix Security Alert: Zero-Day Vulnerability Update addressing Citrix Session Recording vulnerabilities CVE-2024-8068 and CVE-2024-8069.

    CVE-2024-8068 and CVE-2024-8069: Citrix Session Recording Vulnerability

  • Security alert: Zero-day vulnerability update (CVE-2024-50340) for Symfony Profiler, allowing remote access via injected arguments.

    Understanding CVE-2024-50340 – Remote Access to Symfony Profiler

  • RCE CyberPanel

    CVE-2024-51567 Code Execution Vulnerability in CyberPanel

  • Security advisory graphic announcing a zero-day vulnerability update for Ivanti Virtual Traffic Manager (vTM), CVE-2024-7593.

    Exploited: Ivanti Virtual Traffic Manager (vTM ) (CVE-2024-7593)

  • CVE-2024-38526 - Polyfill

    CVE-2024-38526 – Polyfill Supply Chain Attack for Malicious Code Execution

  • Breaking news alert from Ionix about a zero-day vulnerability update for a severe Serv-U vulnerability (CVE-2024-28995), providing an overview and response guide.

    SolarWinds Fixes Severe Serv-U Vulnerability (CVE-2024-28995): Overview and Response Guide 

  • Illustration of DNS server hijacking: A red warning triangle overlays a DNS server graphic connected to a globe, symbolizing a digital supply chain threat to the internet's critical service.

    DNS Server Hijacking Explained: Examples & Mitigation

  • Breaking news alert from Ionix announcing a zero-day vulnerability update for CVE-2024-24919 affecting the Quantum Security Gateway, resulting in information disclosure.

    CVE-2024-24919 – Check Point Quantum Gateway

  • Graphic of an email with a warning sign, illustrating the concept of mail hijacking as an emerging threat to digital supply chains.

    Email Hijacking – Protect Yourself From Supply Chain Attack

  • 1
  • 2