Cisco Patches Multiple Flaws in Adaptive Security Appliance and Firepower...
Cisco releases a bundled publication to address 12 vulnerabilities across Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD) and Firepower Management Center (FMC), including a critical...
View Article5 Ways to Protect Scanning Credentials for Windows Hosts
This is the second installment in our three-part series exploring how to use Tenable products to protect credentials used for network assessments. Here, we provide specific guidance for Microsoft...
View ArticleCVE-2020-12720: vBulletin Urges Users to Patch Undisclosed Security...
vBulletin released patches for an undisclosed security vulnerability, encouraging users to apply the patch as soon as possible.BackgroundOn May 7, vBulletin, a popular online forum software, announced...
View ArticleMicrosoft’s May 2020 Patch Tuesday Addresses 111 CVEs
After back-to-back months of patching more than 100 CVEs, Microsoft released another 111 CVEs this month, none of which were publicly disclosed or exploited in the wild.Microsoft addressed 111 CVEs in...
View ArticleScams Exploit COVID-19 Giveaways Via Venmo, PayPal and Cash App
The economic impact of COVID-19, which is causing record unemployment, creates a golden opportunity for scammers looking to target vulnerable people desperate for cash to help pay their bills.As Cash...
View ArticleCVE-2020-2883: Oracle WebLogic Deserialization Vulnerability Exploited in the...
Following initial reports that attackers were exploiting a vulnerability in Oracle WebLogic Server, researchers have shared more information about the flaw and its connection to CVE-2020-2555, just as...
View ArticleTenable Bolsters Container Security to Capture Open-Source Vulnerabilities
The rise of open-source software means greater speed and efficiency for developers, as well as heightened security risks. Here's how DevOps teams can protect their containerized applications against...
View ArticleChoosing the Right Architecture for Your Nessus Agent Deployment
As organizations adapt to work-from-home mandates, we detail the three most common configurations for securing your remote workforce using Nessus Agent deployments.In several of our recent blog posts,...
View Article5 Ways to Protect Scanning Credentials for Linux, macOS and Unix Hosts
This is the third installment in our three-part series exploring how to use Tenable products to protect credentials used for network assessments. Here, we focus on ’nix style systems: Linux, Unix and...
View ArticleLearn How To Embrace Risk-Based Vulnerability Management
Legacy vulnerability management tools can no longer keep up with the expanding attack surface. Now is the time to focus your remediation efforts on the vulnerabilities that pose the greatest risk to...
View ArticleSecuring Critical Infrastructure: 4 Steps for Reducing Cyber Risk
For critical infrastructure organizations, the gains of automation and IoT technology have also meant heightened threats. These are the steps security directors can take to reduce cyber risk across...
View ArticleCisco Patches Multiple Flaws in Adaptive Security Appliance and Firepower...
Cisco releases a bundled publication to address 12 vulnerabilities across Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD), including a critical path traversal vulnerability.Update...
View ArticleHow to Use VPR to Manage Threats Prior to NVD Publication
How does Tenable’s VPR score help users manage newly disclosed vulnerabilities, even before they’re published on the National Vulnerability Database (NVD)? Let’s find out.In April, we published a blog...
View ArticleA Look at the 5 Most Common Types of Cyberattacks
Learn more about the key threat vectors you will need to combat with vulnerability assessment tools and cybersecurity best practices.The modern cybersecurity landscape is incredibly complex by any...
View ArticleThe ‘Next Chapter’ in Cyber Risk: Are Federal Agencies Prepared?
The latest study from MeriTalk finds increased technical collaboration across federal agencies and industry stakeholders, as well as some worrying gaps in cybersecurity fundamentals.Tenable recently...
View ArticleThe ROI of Industrial Cybersecurity: What You Need to Know
Industrial cybersecurity not only pays for itself through cost savings and avoided breaches — it also improves operational resiliency at a time of increased cyberattack activity.As organizations...
View ArticleCVE-2020-10136: IP-in-IP Packet Processing Vulnerability Could Lead to DDoS,...
IP-in-IP packet processing, a protocol used for tunneling by numerous vendors, contains a vulnerability that may lead to DDoS, information leakage and bypass of network access controls.BackgroundOn...
View ArticleIDC Ranks Tenable Number One in the Worldwide Vulnerability Management Market...
IDC’s first-ever market share report for the worldwide device vulnerability management market ranks Tenable as #1 in market share for 2019 and credits the company for extending its reach far beyond...
View ArticleA Look at What Makes a Vulnerability Survive in the Remediation Race
In the first of our three-part series, Tenable Research unveils the key findings from our new report on common persistent vulnerabilities, including their likely causes and the importance of...
View ArticleWhat Is the Lifespan of a Vulnerability?
In the second of our three-part series on persistent vulnerabilities, Tenable Research examines survival data to assess how effectively traditional remediation tactics are combating the attacker's...
View Article