Tenable Bolsters Its Cloud Security Arsenal with Malware Detection
Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous...
View ArticleAs Pro-Russia Hactivists Target OT Systems, Here’s What You Need To Know
U.S. and international cybersecurity and law enforcement agencies this week issued a joint fact sheet to highlight and safeguard against the continued malicious cyber activity conducted by pro-Russia...
View ArticleCybersecurity Snapshot: Attackers Pounce on Unpatched Vulns, DBIR Says, as...
Verizon’s DBIR found that hackers are having a field day exploiting vulnerabilities to gain initial access. Plus, a CISA program is helping critical infrastructure organizations prevent ransomware...
View ArticleCVE-2024-21793, CVE-2024-26026: Proof of Concept Available for F5 BIG-IP Next...
Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords.BackgroundOn May 8, F5...
View ArticleCybersecurity Snapshot: New Guide Explains How To Assess if Software Is...
Is the software your company wants to buy securely designed? A new guide outlines how you can find out. Meanwhile, a new NIST framework can help you assess your GenAI systems’ risks. Plus, a survey...
View ArticleShifting the Paradigm: Why the Cyber Insurance Industry Should Focus on...
Does your organization currently have a cyber insurance policy? Without it, you are missing a critical piece of a holistic security strategy. With increased cyberattacks and expansion in cloud and...
View ArticleTenable Cloud Security Study Reveals a Whopping 95% of Surveyed Organizations...
The finding from the Tenable 2024 Cloud Security Outlook study is a clear sign of the need for proactive and robust cloud security. Read on to learn more about the study’s findings, including the main...
View ArticleMicrosoft’s May 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-30051,...
1Critical57Important1Moderate0LowMicrosoft addresses 59 CVEs in its May 2024 Patch Tuesday release with one critical vulnerability and three zero-day vulnerabilities, two of which were exploited in the...
View ArticleKinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers
BackgroundCloud cryptomining has become an emerging trend in recent years, powered by the scalability and flexibility of cloud platforms. Unlike traditional on-premises infrastructure, cloud...
View ArticleCybersecurity Snapshot: CISA Warns Hospitals about Black Basta, as Tenable...
Find out why healthcare organizations must beware of the Black Basta ransomware group. Meanwhile, a Tenable study found that 95% of surveyed organizations suffered a cloud-related breach, and offers...
View ArticleLinguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent...
Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services.Key...
View ArticleWhat To Keep in Mind When Securing Kubernetes Persistent Volumes
To many, Kubernetes is a black box that’s difficult to understand, manage and secure. If you’re using stateful persistent volumes – cloud resources that live and manage data outside the scope of your...
View ArticleHow A CNAPP Can Take You From Cloud Security Novice To Native In 10 Steps
Context is critical in cloud security. In a recent RSA presentation, Tenable's Shai Morag offered ten tips for end-to-end cloud infrastructure security.At the recent RSA Conference, Shai Morag, SVP and...
View ArticleCybersecurity Snapshot: EPA Urges Water Plants To Boost Cybersecurity, as...
Check out the EPA’s call for water plants to beef up their cyber defenses. Plus, open source developers have a new platform to share threat intelligence. Moreover, business email compromise attacks...
View ArticleTenable Delivers Innovative Enhancements to the Assure MSSP Program and MSSP...
The enhancements include a new self-provisioning capability in the MSSP Portal that’ll drastically shorten customer onboarding and a quarterly billing option for MSSP Program partners.Tenable’s partner...
View ArticleCVE-2024-24919: Check Point Security Gateway Information Disclosure Zero-Day...
Amid warnings of threat actors targeting VPN devices, Check Point has identified a zero-day information disclosure vulnerability impacting Check Point Network Security gateways which has been exploited...
View ArticleCybersecurity Snapshot: 6 Best Practices for Implementing AI Securely and...
Like many organizations, yours is likely using AI – or at least thinking about deploying it soon. But how can you ensure you use it securely, responsibly, ethically and in compliance with regulations?...
View ArticleThese Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall...
Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if...
View ArticleCVE-2024-4358, CVE-2024-1800: Exploit Code Available for Critical Exploit...
Researchers have released an exploit chain to achieve remote code execution on unpatched instances of Progress Telerik Report Server. Immediate patching is recommended.BackgroundOn May 31, security...
View ArticleRockwell Automation: Disconnect OT Devices with Public-Facing Internet...
An advisory from Rockwell Automation reiterates the importance of disconnecting operational technology devices with public-facing internet access and patching and mitigating systems vulnerable to...
View Article