Quantcast
Channel: Tenable Blog
Browsing all 1935 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous...

View Article


Image may be NSFW.
Clik here to view.

As Pro-Russia Hactivists Target OT Systems, Here’s What You Need To Know

U.S. and international cybersecurity and law enforcement agencies this week issued a joint fact sheet to highlight and safeguard against the continued malicious cyber activity conducted by pro-Russia...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Attackers Pounce on Unpatched Vulns, DBIR Says, as...

Verizon’s DBIR found that hackers are having a field day exploiting vulnerabilities to gain initial access. Plus, a CISA program is helping critical infrastructure organizations prevent ransomware...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-21793, CVE-2024-26026: Proof of Concept Available for F5 BIG-IP Next...

Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords.BackgroundOn May 8, F5...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: New Guide Explains How To Assess if Software Is...

Is the software your company wants to buy securely designed? A new guide outlines how you can find out. Meanwhile, a new NIST framework can help you assess your GenAI systems’ risks. Plus, a survey...

View Article


Image may be NSFW.
Clik here to view.

Shifting the Paradigm: Why the Cyber Insurance Industry Should Focus on...

Does your organization currently have a cyber insurance policy? Without it, you are missing a critical piece of a holistic security strategy. With increased cyberattacks and expansion in cloud and...

View Article

Image may be NSFW.
Clik here to view.

Tenable Cloud Security Study Reveals a Whopping 95% of Surveyed Organizations...

The finding from the Tenable 2024 Cloud Security Outlook study is a clear sign of the need for proactive and robust cloud security. Read on to learn more about the study’s findings, including the main...

View Article

Image may be NSFW.
Clik here to view.

Microsoft’s May 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-30051,...

1Critical57Important1Moderate0LowMicrosoft addresses 59 CVEs in its May 2024 Patch Tuesday release with one critical vulnerability and three zero-day vulnerabilities, two of which were exploited in the...

View Article


Image may be NSFW.
Clik here to view.

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

BackgroundCloud cryptomining has become an emerging trend in recent years, powered by the scalability and flexibility of cloud platforms. Unlike traditional on-premises infrastructure, cloud...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: CISA Warns Hospitals about Black Basta, as Tenable...

Find out why healthcare organizations must beware of the Black Basta ransomware group. Meanwhile, a Tenable study found that 95% of surveyed organizations suffered a cloud-related breach, and offers...

View Article

Image may be NSFW.
Clik here to view.

Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent...

Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services.Key...

View Article

Image may be NSFW.
Clik here to view.

What To Keep in Mind When Securing Kubernetes Persistent Volumes

To many, Kubernetes is a black box that’s difficult to understand, manage and secure. If you’re using stateful persistent volumes – cloud resources that live and manage data outside the scope of your...

View Article

Image may be NSFW.
Clik here to view.

How A CNAPP Can Take You From Cloud Security Novice To Native In 10 Steps

Context is critical in cloud security. In a recent RSA presentation, Tenable's Shai Morag offered ten tips for end-to-end cloud infrastructure security.At the recent RSA Conference, Shai Morag, SVP and...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: EPA Urges Water Plants To Boost Cybersecurity, as...

Check out the EPA’s call for water plants to beef up their cyber defenses. Plus, open source developers have a new platform to share threat intelligence. Moreover, business email compromise attacks...

View Article

Image may be NSFW.
Clik here to view.

Tenable Delivers Innovative Enhancements to the Assure MSSP Program and MSSP...

The enhancements include a new self-provisioning capability in the MSSP Portal that’ll drastically shorten customer onboarding and a quarterly billing option for MSSP Program partners.Tenable’s partner...

View Article


Image may be NSFW.
Clik here to view.

CVE-2024-24919: Check Point Security Gateway Information Disclosure Zero-Day...

Amid warnings of threat actors targeting VPN devices, Check Point has identified a zero-day information disclosure vulnerability impacting Check Point Network Security gateways which has been exploited...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: 6 Best Practices for Implementing AI Securely and...

Like many organizations, yours is likely using AI – or at least thinking about deploying it soon. But how can you ensure you use it securely, responsibly, ethically and in compliance with regulations?...

View Article


Image may be NSFW.
Clik here to view.

These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall...

Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-4358, CVE-2024-1800: Exploit Code Available for Critical Exploit...

Researchers have released an exploit chain to achieve remote code execution on unpatched instances of Progress Telerik Report Server. Immediate patching is recommended.BackgroundOn May 31, security...

View Article

Image may be NSFW.
Clik here to view.

Rockwell Automation: Disconnect OT Devices with Public-Facing Internet...

An advisory from Rockwell Automation reiterates the importance of disconnecting operational technology devices with public-facing internet access and patching and mitigating systems vulnerable to...

View Article
Browsing all 1935 articles
Browse latest View live