Quantcast
Browsing all 2001 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Salt Typhoon: An Analysis of Vulnerabilities Exploited by this...

Salt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has breached at least nine U.S.-based telecommunications companies with the intent to target high profile government and...

View Article


Image may be NSFW.
Clik here to view.

CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly...

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers.Update January 23: The Analysis and Identifying affected systems...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: WEF Offers AI Security Best Practices, as DORA...

Check out tips for adopting AI securely from the World Economic Forum. Plus, the EU’s DORA cyber rules for banks go into effect. Meanwhile, a report warns about overprivileged cloud accounts. And get...

View Article

Image may be NSFW.
Clik here to view.

How To Clean Up Your Cloud Environment Using Tenable Cloud Security

You must periodically review your cloud environments to remove old and unused resources because they can create security risks. But what is the right way to perform this task? Read on to learn about...

View Article

Image may be NSFW.
Clik here to view.

What Makes This “Data Privacy Day” Different?

As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Strategist, wants to remind us that we live in a digital world and that we need to protect it. With data...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While...

Check out the Cloud Security Alliance’s recommendations for rolling out AI apps securely. Meanwhile, a Deloitte survey found GenAI initiatives by cyber teams deliver the highest ROI to their orgs....

View Article

Image may be NSFW.
Clik here to view.

CISA Releases FOCAL Plan to Help Federal Agencies Reduce Cyber Risk

CISA’s FOCAL Plan, which aims to standardize the cybersecurity operations of federal civilian agencies, marks an important step in the federal government's efforts to strengthen cyber defenses and...

View Article

Image may be NSFW.
Clik here to view.

Tenable Supercharges Exposure Management with Acquisition of Vulcan Cyber

Vulcan brings more than 100 additional third-party integrations and enhanced remediation workflows to the Tenable One Exposure Management Platform, enabling organizations to prioritize their security...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge...

Check out recommendations from CISA and others on how to protect network edge devices and applications. Plus, OWASP has published the 10 risks associated with non-human identities. In addition, find...

View Article


Image may be NSFW.
Clik here to view.

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418,...

3Critical52Important0Moderate0LowMicrosoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two that were exploited in the wild.Microsoft patched 55 CVEs in its...

View Article

Image may be NSFW.
Clik here to view.

Frequently Asked Questions About DeepSeek Large Language Model (LLM)

The open-source LLM known as DeepSeek has attracted much attention in recent weeks with the release of DeepSeek V3 and DeepSeek R1, and in this blog, The Tenable Security Response Team answers some of...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow...

Check out best practices for preventing buffer overflow attacks. Plus, Europol offers best practices for banks to adopt quantum-resistant cryptography. Meanwhile, an informal Tenable poll looks at...

View Article

Image may be NSFW.
Clik here to view.

How To Reduce DNS Infrastructure Risk To Secure Your Cloud Attack Surface

Mismanaging your DNS infrastructure could put you at risk of destructive cyberattacks – especially as your cloud attack surface expands. Read on to learn about DNS vulnerabilities, the impact of DNS...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Ghost Ransomware Group Targets Known Vulns, CISA...

Check out mitigation recommendations to protect your organization against the Ghost ransomware gang. Plus, get tips on how to attract and retain top cybersecurity professionals. And get the latest on...

View Article

Image may be NSFW.
Clik here to view.

Identity Is the New Battleground: Why Proactive Security Is the Way Forward

Protecting identities has become a top priority for security teams. However, many organizations remain exposed due to blind spots caused by identity sprawl and misplaced trust in identity providers....

View Article


Image may be NSFW.
Clik here to view.

Identity Security Is the Missing Link To Combatting Advanced OT Threats

Sophisticated OT threats, like living-off-the-land (LotL) attacks, exploit identity vulnerabilities to infiltrate critical infrastructure. Find out how robust identity security and unified exposure...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: OpenSSF Unveils Framework for Securing Open Source...

Check out a new framework for better securing open source projects. Plus, learn how AI is making ransomware harder to detect and mitigate. In addition, find out the responsible AI challenges orgs face...

View Article


Image may be NSFW.
Clik here to view.

Creating Elegant Azure Custom Roles: Putting NotActions into Action!

Creating custom Roles in Azure can be a complex process that may yield long and unwieldy Role definitions that are difficult to manage. However, it doesn’t have to be that way. Read on to learn how you...

View Article

Image may be NSFW.
Clik here to view.

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in...

Broadcom published an advisory for three flaws in several VMware products that were exploited in the wild as zero-days. Organizations are advised to apply the available patches.Update March 4: The...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best...

Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal...

View Article
Browsing all 2001 articles
Browse latest View live