Cybersecurity Snapshot: Medusa Ransomware Impacting Critical Infrastructure,...
Check out how to protect your org against the Medusa ransomware gang. Plus, another cryptographic algorithm designed to resist quantum attacks will be standardized. Meanwhile, Tenable did a deep dive...
View ArticleWhat Is Exposure Management and Why Does It Matter?
Each Monday, the Tenable Exposure Management Academy will provide the practical, real-world guidance you need to shift from vulnerability management to exposure management. In our first blog in this...
View ArticleChoosing the Right Cloud Security Provider: Five Non-Negotiables for...
Protecting your cloud environment for the long term involves choosing a security partner whose priorities align with your needs. Here's what you need to know.As organizations embrace multi-cloud and...
View ArticleCybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as...
Check out key findings and insights from the “Tenable Cloud AI Risk Report 2025.” Plus, get fresh guidance on how to transition to quantum-resistant cryptography. In addition, find out how AI is...
View ArticleWhat it Takes to Start the Exposure Management Journey
Each Monday, the Tenable Exposure Management Academy will provide the practical, real-world guidance you need to make the shift from vulnerability management to exposure management. In this blog,...
View ArticleCVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514:...
Frequently asked questions about five vulnerabilities in the Ingress NGINX Controller for Kubernetes, collectively known as IngressNightmare.BackgroundThe Tenable Security Response Team (SRT) has...
View ArticleWho's Afraid of AI Risk in Cloud Environments?
The Tenable Cloud AI Risk Report 2025 reveals that 70% of AI cloud workloads have at least one unremediated critical vulnerability — and that AI developer services are plagued by risky permissions...
View ArticleCybersecurity Snapshot: NIST Details Attacks Against AI, Recommends Defenses,...
Check out NIST’s comprehensive taxonomy of cyberattacks against AI systems, along with mitigation recommendations. Plus, organizations have another cryptographic algorithm for protecting data against...
View ArticleCybersecurity Leaders Share Three Challenges Exposure Management Helps Them...
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three...
View ArticleImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run
Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions...
View Article