Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable
Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts...
View ArticleHow To Secure Your IT, OT and IoT Assets With an Exposure Management...
Explore how Tenable One for OT/IoT helps organizations stay ahead in today's evolving threat landscape with end-to-end visibility and cyber risk prioritization across IT, OT and IoT.Visibility serves...
View ArticleFlowFixation: AWS Apache Airflow Service Takeover Vulnerability and Why...
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of...
View ArticleCybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF...
Check out the NSA’s 10 key best practices for securing cloud environments. Plus, learn how cloud native computing could help streamline your AI deployments. Meanwhile, don’t miss the latest about...
View ArticleEnhancing Transportation Cybersecurity and Fleet Management for the DoD
Few things can halt operations across the Department of Defense like a critical failure of logistics and transportation. From automated asset inventory to malicious-activity detections through...
View ArticleCybersecurity Snapshot: U.S. Gov’t Unpacks AI Threat to Banks, as NCSC Urges...
Check out new guidance for banks on combating AI-boosted fraud. Plus, how to cut cyber risk when migrating SCADA systems to the cloud. Meanwhile, why CISA is fed up with SQLi flaws. And best practices...
View ArticleFrequently Asked Questions About CVE-2024-3094, A Backdoor in XZ Utils
Frequently asked questions about CVE-2024-3094, a supply-chain attack responsible for a backdoor in XZ Utils, a widely used library found in multiple Linux distributions.Update March 29: The "What...
View ArticleCybersecurity Snapshot: CSRB Calls Exchange Online Hack “Preventable,” While...
Check out why the Cyber Safety Review Board has concluded that the Microsoft Exchange Online breach “should never have occurred.” Plus, warnings about the supply chain attack against the XZ Utils open...
View ArticleMicrosoft’s April 2024 Patch Tuesday Addresses 147 CVEs (CVE-2024-29988)
3Critical142Important2Moderate0LowMicrosoft addresses 147 CVEs in its April 2024 Patch Tuesday release with three criticalvulnerabilitiesandno zero-day or publicly disclosed vulnerabilities.Microsoft...
View ArticleCybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails...
Check out CISA’s urgent call for federal agencies to protect themselves from Midnight Blizzard’s breach of Microsoft corporate emails. Plus, a new survey shows cybersecurity pros are guardedly...
View ArticleCVE-2024-3400: Zero-Day Vulnerability in Palo Alto Networks PAN-OS...
A critical severity command injection vulnerability in Palo Alto Networks PAN-OS has been exploited in limited targeted attacks. While a fix is not yet available, patches are expected to be released on...
View ArticleNavigating Security Challenges Around OT in the DoD’s Manufacturing Lines
How operational technology can revolutionize logistics, supply chain management, and overall efficiency.Operational technology (OT) is set to transform the Department of Defense's (DoD) manufacturing...
View ArticleStrengthening the Nessus Software Supply Chain with SLSA
You know Tenable as a cybersecurity industry leader whose world-class exposure management products are trusted by our approximately 43,000 customers, including about 60% of the Fortune 500. But...
View ArticleOracle April 2024 Critical Patch Update Addresses 239 CVEs
Oracle addresses 239 CVEs in its second quarterly update of 2024 with 441 patches, including 38 critical updates.BackgroundOn April 16, Oracle released its Critical Patch Update (CPU) for April 2024,...
View ArticleTenable and Thales Collaborate to Provide Cyber Defense Simulations to Better...
The heart of the Welsh Valleys is home to the Thales Ebbw Vale campus, a world-class facility jointly funded by the Welsh government as part of its regeneration program for the region. At the core of...
View ArticleCybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford...
Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. Plus, Stanford University offers a comprehensive review of AI trends. Meanwhile, a new open-source tool aims...
View ArticleOperational Technology in the DoD: Ensuring a Secure and Efficient Power Grid
In an evolving threat landscape, the DoD must make sure that its mission-critical operations don’t experience power outages.From illuminating command centers to fueling advanced weapons systems,...
View ArticleCVE-2024-4040: CrushFTP Virtual File System (VFS) Sandbox Escape...
A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as...
View ArticleCVE-2024-20353, CVE-2024-20359: Frequently Asked Questions About ArcaneDoor
Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security...
View ArticleCybersecurity Snapshot: Latest MITRE ATT&CK Update Offers Security Insights...
Check out what’s new in Version 15 of the MITRE ATT&CK knowledge base of adversary tactics, techniques and procedures. Plus, learn the latest details about the Change Healthcare breach, including...
View Article