Microsoft’s August 2024 Patch Tuesday Addresses 88 CVEs
7Critical80Important1Moderate0LowMicrosoft addresses 88 CVEs with seven critical vulnerabilities and 10 zero-day vulnerabilities, six of which were exploited in the wild.Microsoft patched 88 CVEs in...
View ArticleCVE-2024-7593: Ivanti Virtual Traffic Manager Authentication Bypass...
Ivanti released a patch for a critical severity authentication bypass vulnerability and a warning that exploit code is publicly availableBackgroundOn August 13, Ivanti released a security advisory to...
View ArticleCybersecurity Snapshot: First Quantum-resistant Algorithms Ready for Use,...
NIST has released the first encryption algorithms that can protect data against quantum attacks. Plus, MIT launched a new database of AI risks. Meanwhile, the CSA published a paper outlining the unique...
View ArticleSSRFing the Web with the help of Copilot Studio
Tenable Research discovered a critical information-disclosure vulnerability in Microsoft’s Copilot Studio via a server-side request forgery (SSRF), which allowed researchers access to potentially...
View ArticleCybersecurity Snapshot: Guide Unpacks Event-Logging Best Practices, as FAA...
Looking to sharpen your team’s event logging and threat detection? A new guide offers plenty of best practices. Plus, the FAA wants airplanes to be more resilient to cyberattacks. Meanwhile, check out...
View ArticleCISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via...
Conventional wisdom suggests the keys to protect critical infrastructure against cyberattacks are network segmentation and OT security. But continued breaches imply those methods alone fall short. In...
View Article$200 Million Cybersecurity E-Rate Funding Available for K-12 Schools and...
Empowering K-12 schools and libraries to strengthen their cybersecurity posture with new funding opportunities and best practices.Recent attacks reveal that K-12 schools and libraries are prime targets...
View ArticleSecure Your Sprawling Attack Surface With Risk-based Vulnerability Management
The cloud, artificial intelligence (AI), machine learning and other technological breakthroughs are radically changing the modern work environment. New assets and services offer increased flexibility,...
View ArticleThe Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy
DSPM solutions provide a comprehensive, up-to-date view into cloud-based data and risk. An integrated CNAPP and DSPM solution elevates this analysis to expose toxic combinations and security gaps...
View ArticleAA24-241A : Joint Cybersecurity Advisory on Iran-based Cyber Actors Targeting...
A joint Cybersecurity Advisory highlights Iran-based cyber actor ransomware activity targeting U.S. organizations. The advisory includes CVEs exploited, alongside techniques, tactics and procedures...
View ArticleCybersecurity Snapshot: Schools Suffer Heavy Downtime Losses Due To...
The cost of ransomware downtime in schools gets pegged at $500K-plus per day. Meanwhile, check out the AI-usage risks threatening banks’ cyber resilience. Plus, Uncle Sam is warning about a dangerous...
View ArticleCybersecurity Snapshot: RansomHub Group Triggers CISA Warning, While FBI Says...
Cybersecurity teams must beware of RansomHub, a surging RaaS gang. Plus, North Korea has unleashed sophisticated social-engineering schemes against crypto employees. Meanwhile, a new SANS report...
View ArticleCVE-2021-20123, CVE-2021-20124: DrayTek Vulnerabilities Discovered by Tenable...
With patches out for three years, attackers have set their sights on a pair of vulnerabilities affecting DrayTek VigorConnect.BackgroundIn November 2021, the Cybersecurity and Infrastructure Security...
View ArticleMicrosoft’s September 2024 Patch Tuesday Addresses 79 CVEs (CVE-2024-43491)
7Critical71Important1Moderate0LowMicrosoft addresses 79 CVEs with seven critical vulnerabilities and four zero-day vulnerabilities, including three that were exploited in the wild.Microsoft patched 79...
View ArticleCybersecurity Snapshot: Russia-backed Hackers Aim at Critical Infrastructure...
Critical infrastructure operators must beware of Russian military hacking groups. Plus, cyber scammers are having a field day with crypto fraud. Meanwhile, AI and cloud vendors face stricter reporting...
View ArticleCloudImposer: Executing Code on Millions of Google Servers with a Single...
Tenable Research discovered a remote code execution (RCE) vulnerability in Google Cloud Platform (GCP) that is now fixed and that we dubbed CloudImposer. The vulnerability could have allowed an...
View ArticleMastering Containerization: Key Strategies and Best Practices
As organizations modernize their infrastructure, containers offer unparalleled flexibility and scalability but they also introduce unique security challenges. In this blog we explain container security...
View ArticleAn Analyst’s Guide to Cloud-Native Vulnerability Management: Where to Start...
Cloud-native workloads introduce a unique set of challenges that complicate traditional approaches to vulnerability management. Learn how to address these challenges and scale cloud-native VM in your...
View ArticleCybersecurity Snapshot: Critical Infrastructure Orgs Found Vulnerable to...
Report finds that many critical infrastructure networks can be breached using simple attacks. Plus, a new MITRE Engenuity tool uses machine learning to infer attack sequences. Meanwhile, CISA will lead...
View ArticleEstablishing a Cloud Security Program: Best Practices and Lessons Learned
As we’ve developed Tenable’s cloud security program, we in the Infosec team have asked many questions and faced interesting challenges. Along the way, we’ve learned valuable lessons and incorporated...
View Article