Pig Butchering Scam: From Tinder and TikTok to WhatsApp and Telegram, How...
In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This...
View ArticleCybersecurity Snapshot: ChatGPT Gets So-So Grade in Code Analysis Test, while...
Check out why ChatGPT’s code analysis skills left Carnegie Mellon researchers unimpressed. Plus, JCDC will put special focus on critical infrastructure security in 2024. Meanwhile, CISA and OpenSSF...
View ArticleManaged Kubernetes: Is It Right for My Organization?
As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your...
View ArticleFrequently Asked Questions about ScreenConnect Vulnerabilities
Frequently asked questions about two vulnerabilities affecting ConnectWise ScreenConnectUpdate February 20: The blog has been updated with confirmation from ConnectWise of in-the-wild exploitation.View...
View ArticleProtecting DoD Building Management Systems with Advanced OT Security
The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are...
View ArticleIDC Ranks Tenable No. 1 in Worldwide Device Vulnerability Management Market...
The research firm’s latest report also provides market insights that security professionals can use to improve their vulnerability management strategy.IDC recently published its “Worldwide Device...
View ArticleCybersecurity Snapshot: LockBit Gang Gets Knocked Down, as CISA Stresses...
Check out how cyber agencies from multiple countries hit the LockBit ransomware group. Meanwhile, CISA wants water treatment plants to button up their cyber defenses. Plus, there’s a new generative AI...
View ArticleHow To Secure All of Your Assets - IT, OT and IoT - With an Exposure...
Enterprise security teams face serious hurdles to safeguarding their critical OT/IoT infrastructure, including fragmented visibility, unanticipated risks and data silos. Discover how purpose-built...
View ArticleCybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as...
Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a...
View ArticleCVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in...
Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution.Update March 7: The...
View ArticleCybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While...
More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database...
View ArticleHow To Secure All of Your Assets - IT, OT and IoT - With an Exposure...
Discover how contextual prioritization of exposure is revolutionizing OT/IoT security, enabling organizations to shift from reactive to proactive breach prevention.Connectivity of physical assets— such...
View ArticleWhat’s in Store This Year for Tenable Partners? A Lot of Growth, Including...
Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our...
View ArticleMicrosoft’s March 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-21407)
2Critical57Important0Moderate0LowMicrosoft addresses 59 CVEs in its March2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.Microsoft patched 59 CVEs in its March 2024...
View ArticleIntroducing Tenable AI Assistant: Your Generative AI Analyst To Achieve...
Context is critical when it comes to analyzing and prioritizing your exposures. Learn how Tenable AI Assistant, your new Gen AI-based security analyst, can help you answer specific questions, interpret...
View ArticleCVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability
Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.BackgroundOn March 12, Fortinet...
View ArticleCybersecurity Snapshot: CISA Shines Light on Cloud Security and on Hybrid IAM...
Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against...
View ArticleIdentifying Web Cache Poisoning and Web Cache Deception: How Tenable Web App...
Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some...
View ArticleTaking Control of Kubernetes: Enforcing Least Privilege to Secure Your...
Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of...
View ArticleRecent NVD Delays Won’t Affect Tenable Vulnerability Management Customers...
NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable VM customers because our vulnerability scoring is based on...
View Article