Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

April 16, 2025

有关 MITRE CVE 计划到期和续订的常见问题

Concerns about the future of the MITRE CVE Program continue to circulate. The Tenable Security Response Team has created this FAQ to help provide clarity and context around this developing situation....


April 16, 2025

Oracle 2025 年重要补丁更新解决了 171 个 CVE

Oracle addresses 171 CVEs in its second quarterly update of 2025 with 378 patches, including 40 critical updates.BackgroundOn April 15, Oracle released its Critical Patch Update (CPU) for April 2025, the second quarterly update of the year. This CPU contains fixes for 171 unique CVEs in 378 security...


April 15, 2025

MITRE CVE 计划资金资助延长一年

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. While CISA secured funding on April 16 to extend the program for the next year, the lack of clarity surrounding its long-term future creates great uncertainty about how newly discovered vulnerabilities will be ca...


April 14, 2025

You Have Exposure Management Questions. We’ve Got Answers

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we feature the first Exposure Management Academy FAQ. We’ll run these FAQs from time to time to share some of the mos...


April 11, 2025

Geopolitics Just Cranked Up Your Threat Model, Again. Here’s What Cyber Pros Need to Know

If it feels like your entire cybersecurity program is once again operating on a geopolitical fault line, you're not imagining things....


April 11, 2025

網路安全快照: Beware of Mobile Spyware Attacks, Cyber Agencies Warn, While Corporate Boards Get Cyber Governance Guidance

Check out why a global geopolitical spyware campaign could ensnare mobile users outside of its target groups. Plus, the U.K.’s cyber agency offers cyber governance resources to boards of directors. Also, find out what webinar attendees told Tenable about using port scanning and service discovery to ...


April 10, 2025

Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications

The emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some security concerns. In this blog we address FAQs about MC...


April 9, 2025

五步加强云安全:云配置安全的重要性

Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management....


April 8, 2025

Microsoft 2025 年 4 月补丁星期二解决了 121 个 CVE (CVE-2025-29824)

Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild....


April 8, 2025

如何实施即时访问:最佳实践和经验教训

With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, we’ll share how we implemented JIT access internally at Tenable using...


April 7, 2025

迈向风险暴露管理的 5 个步骤

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we explore the five steps to take on your journey to exposure management....


April 4, 2025

網路安全快照: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods

Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security practices. In addition, CISA and other cyber agencies warn that attackers are using “fast flux” techniques to conceal their actio...


您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

Apache Log4j 缺陷让第三方软件成为关注焦点

获取详细信息 >