Microsoft’s November 2020 Patch Tuesday Addresses 112 CVEs including...
Microsoft addressed over 112 CVEs in its November release, including a zero-day vulnerability in the Windows kernel that was exploited in the wild as part of a targeted attack.Microsoft patched 112...
View ArticleCVE-2020-27125, CVE-2020-27130, CVE-2020-27131: Pre-Authentication...
Following the publication of proof-of-concept (PoC) code, Cisco released three advisories for multiple vulnerabilities silently patched in a recent update. Organizations should apply these patches...
View ArticleTenable and ServiceNow: Extending Vulnerability Response Options Through...
As customers increasingly recognize the value of vulnerability response, Tenable and ServiceNow are delivering market-leading vulnerability insights and greater flexibility to help IT and security...
View ArticleConquer Your Cyber Risk: Advanced Capabilities in Tenable Lumin That Help
Key security metrics in Tenable Lumin reveal how effectively your team scans for vulnerabilities and remediates critical issues, so you can make process improvements where they matter most. If you’ve...
View ArticleCloud Security: 3 Things InfoSec Leaders Need to Know About the Shared...
Whether you’re just beginning your cloud journey or have years of deployments under your belt, it’s worth taking the time to make sure you’re clear on which aspects of security in the cloud fall to...
View ArticleCybersecurity in the Supply Chain: Why Vulnerability Management is Key
A new report from the U.S. government’s ICT Supply Chain Risk Management Task Force includes guidance on vulnerability management, mitigation and prioritization as key to understanding operational...
View ArticleSpotlight on Mexico: It's Time for Cyber and Business Leaders to Align
With cyberattacks on the rise, a new study shows how a disconnect between cyber and business executives is putting organizations in Mexico at risk. The vast majority of organizations in Mexico (95%)...
View ArticleCybersecurity in the Supply Chain: Why Vulnerability Management is Key
A new report from the U.S. government’s ICT Supply Chain Risk Management Task Force includes guidance on vulnerability management, mitigation and prioritization as key to understanding operational...
View ArticleSecurity Consultants: Optimize Your Service Offerings with Nessus Professional
Security consultants can readily meet clients' specific needs and grow their businesses with help from Nessus Professional. As a cybersecurity consultant, you're in a unique position: You encounter...
View ArticleCOVID-19 Pandemic Data: As Attack Surface Expands, Software Vendors Improve...
Tenable’s Zero-Day Research team found encouraging trends in how quickly software vendors are responding to our private disclosures, as well as how they’re addressing critical and high-severity...
View ArticleMicrosoft’s December 2020 Patch Tuesday Addresses 58 CVEs including...
The final Patch Tuesday of 2020 includes fixes for 58 CVEs, including workaround details for a severe vulnerability in Windows DNS Resolver called SAD DNS.Microsoft patched 58 CVEs in the December 2020...
View ArticleCVE-2020-4006: VMware Command Injection Flaw Exploited by Russian...
The National Security Agency warns that Russian state-sponsored threat actors are exploiting an important VMware vulnerability in the wild.BackgroundOn December 7, the National Security Agency (NSA)...
View Article2021 Global Cybersecurity Policy Challenges and Highlights
For many global policymakers, the transformative impact of the COVID-19 pandemic has reinforced the need to adopt new cybersecurity and privacy policies. Here's a look at what we can expect in the year...
View ArticleAMNESIA:33: Researchers Disclose 33 Vulnerabilities Across Four Open Source...
The vulnerabilities disclosed affect millions of Operational Technology, IoT and IT devices and include multiple remote code execution flaws.BackgroundOn December 8, researchers at Forescout published...
View ArticleIndustrial Attack Vectors: How to Shut Down OT Threats Before An Incident Occurs
As industrial cyberattacks become more sophisticated, security leaders can use attack vectors to identify weak points in their OT infrastructure and stop attacks before they start. Operational...
View ArticleSolorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020...
Nation-state threat actors breached the supply chain of a popular IT management software provider in order to infiltrate government agencies and private companies.Update December 16: The Solution and...
View ArticleA Role-Based Look at How Splunk Mission Control and Tenable Can Streamline...
The new, exclusive integration between Tenable.io and Splunk Mission Control enables security teams to consolidate vulnerability insights and expedite their remediation efforts.It's no surprise that...
View ArticleTenable's Commitment to Security in the Wake of Solorigate
As Tenable's chief security officer I'm simultaneously protecting our own systems while addressing the concerns of our customers around the world. Here's what I've learned so far. The most profound...
View Article4 Ways to Improve Nessus Scans Through Firewalls
Establishing the right configurations and settings can improve Nessus scan results when scanning through firewalls.Of all the factors that can inhibit a successful Nessus scan — busy systems, congested...
View ArticleMicrosoft’s January 2021 Patch Tuesday Addresses 83 CVEs
In its first Patch Tuesday of 2021, Microsoft patched 83 CVEs including 10 critical vulnerabilitiesMicrosoft patched 83 CVEs in the January 2021 Patch Tuesday release, including 10 CVEs rated as...
View Article