Quantcast
Channel: Tenable Blog
Browsing all 1935 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Pig Butchering Scam: From Tinder and TikTok to WhatsApp and Telegram, How...

In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: ChatGPT Gets So-So Grade in Code Analysis Test, while...

Check out why ChatGPT’s code analysis skills left Carnegie Mellon researchers unimpressed. Plus, JCDC will put special focus on critical infrastructure security in 2024. Meanwhile, CISA and OpenSSF...

View Article


Image may be NSFW.
Clik here to view.

Managed Kubernetes: Is It Right for My Organization?

As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your...

View Article

Image may be NSFW.
Clik here to view.

Frequently Asked Questions about ScreenConnect Vulnerabilities

Frequently asked questions about two vulnerabilities affecting ConnectWise ScreenConnectUpdate February 20: The blog has been updated with confirmation from ConnectWise of in-the-wild exploitation.View...

View Article

Image may be NSFW.
Clik here to view.

Protecting DoD Building Management Systems with Advanced OT Security

The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are...

View Article


Image may be NSFW.
Clik here to view.

IDC Ranks Tenable No. 1 in Worldwide Device Vulnerability Management Market...

The research firm’s latest report also provides market insights that security professionals can use to improve their vulnerability management strategy.IDC recently published its “Worldwide Device...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: LockBit Gang Gets Knocked Down, as CISA Stresses...

Check out how cyber agencies from multiple countries hit the LockBit ransomware group. Meanwhile, CISA wants water treatment plants to button up their cyber defenses. Plus, there’s a new generative AI...

View Article

Image may be NSFW.
Clik here to view.

How To Secure All of Your Assets - IT, OT and IoT - With an Exposure...

Enterprise security teams face serious hurdles to safeguarding their critical OT/IoT infrastructure, including fragmented visibility, unanticipated risks and data silos. Discover how purpose-built...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as...

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a...

View Article


Image may be NSFW.
Clik here to view.

CVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in...

Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution.Update March 7: The...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While...

More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database...

View Article

Image may be NSFW.
Clik here to view.

How To Secure All of Your Assets - IT, OT and IoT - With an Exposure...

Discover how contextual prioritization of exposure is revolutionizing OT/IoT security, enabling organizations to shift from reactive to proactive breach prevention.Connectivity of physical assets— such...

View Article

Image may be NSFW.
Clik here to view.

What’s in Store This Year for Tenable Partners? A Lot of Growth, Including...

Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our...

View Article


Image may be NSFW.
Clik here to view.

Microsoft’s March 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-21407)

2Critical57Important0Moderate0LowMicrosoft addresses 59 CVEs in its March2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.Microsoft patched 59 CVEs in its March 2024...

View Article

Image may be NSFW.
Clik here to view.

Introducing Tenable AI Assistant: Your Generative AI Analyst To Achieve...

Context is critical when it comes to analyzing and prioritizing your exposures. Learn how Tenable AI Assistant, your new Gen AI-based security analyst, can help you answer specific questions, interpret...

View Article


Image may be NSFW.
Clik here to view.

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.BackgroundOn March 12, Fortinet...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: CISA Shines Light on Cloud Security and on Hybrid IAM...

Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against...

View Article


Image may be NSFW.
Clik here to view.

Identifying Web Cache Poisoning and Web Cache Deception: How Tenable Web App...

Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some...

View Article

Image may be NSFW.
Clik here to view.

Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your...

Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of...

View Article

Image may be NSFW.
Clik here to view.

Recent NVD Delays Won’t Affect Tenable Vulnerability Management Customers...

NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable VM customers because our vulnerability scoring is based on...

View Article
Browsing all 1935 articles
Browse latest View live