CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability...
Fortinet patched a zero day authentication bypass vulnerability in FortiOS and FortiProxy that has been actively exploited in the wild as a zero-day since November 2024.BackgroundOn January 14,...
View Article5 Things Government Agencies Need to Know About Zero Trust
Zero trust as a concept is simple to grasp. Implementing a zero trust architecture, on the other hand, is complex because it involves addressing a unique mix of process, procedure, technology and user...
View ArticleNew Cybersecurity Executive Order: What It Means for Federal Agencies
The Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity includes guidance on third-party risk management and the need to adopt proven security practices to gain...
View ArticleCybersecurity Snapshot: CISA Lists Security Features OT Products Should Have...
Shopping for OT systems? A new CISA guide outlines OT cyber features to look for. Meanwhile, the U.S. government publishes a playbook for collecting AI vulnerability data. Plus, a White House EO...
View ArticleOracle January 2025 Critical Patch Update Addresses 186 CVEs
Oracle addresses 186 CVEs in its first quarterly update of 2025 with 318 patches, including 30 critical updates.BackgroundOn January 21, Oracle released its Critical Patch Update (CPU) for January...
View ArticleSalt Typhoon: An Analysis of Vulnerabilities Exploited by this...
Salt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has breached at least nine U.S.-based telecommunications companies with the intent to target high profile government and...
View ArticleCVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly...
A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers.Update January 23: The Analysis and Identifying affected systems...
View ArticleCybersecurity Snapshot: WEF Offers AI Security Best Practices, as DORA...
Check out tips for adopting AI securely from the World Economic Forum. Plus, the EU’s DORA cyber rules for banks go into effect. Meanwhile, a report warns about overprivileged cloud accounts. And get...
View ArticleHow To Clean Up Your Cloud Environment Using Tenable Cloud Security
You must periodically review your cloud environments to remove old and unused resources because they can create security risks. But what is the right way to perform this task? Read on to learn about...
View ArticleWhat Makes This “Data Privacy Day” Different?
As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Strategist, wants to remind us that we live in a digital world and that we need to protect it. With data...
View Article