保护 Securing Kubernetes 持久卷时应注意的事项
To many, Kubernetes is a black box that’s difficult to understand, manage and secure. If you’re using stateful persistent volumes – cloud resources that live and manage data outside the scope of your pods – it can be even darker.
Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)
Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services.
網路安全快照: CISA 就 Black Basta 向医院发出警告,因为 Tenable 的研究发现与云相关的漏洞无处不在
Find out why healthcare organizations must beware of the Black Basta ransomware group. Meanwhile, a Tenable study found that 95% of surveyed organizations suffered a cloud-related breach, and offers insights for boosting cloud security. Plus, a Cloud Security Alliance report delves into how AI…
Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers
Tenable Cloud Security Research Team has recently discovered that Kinsing malware, known for targeting Linux-based cloud infrastructures, exploits Apache Tomcat servers with new advanced stealth techniques. Explore our analysis and the indicators of compromise in this report.
Microsoft 的 2024 年 5 月星期二补丁解决了 59 个 CVE (CVE-2024-30051、CVE-2024-30040)
Microsoft addresses 59 CVEs in its May 2024 Patch Tuesday release with one critical vulnerability and three zero-day vulnerabilities, two of which were exploited in the wild.
Tenable 云安全研究显示,95% 的受访企业在过去 18 个月的时间里遭受过与云相关的外泄
Tenable 2024 年云安全展望研究中的发现清楚地表明了市场对主动且强大的云安全的需求。 Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud…
转换模式:为何网络保险业应关注预防性安全
As claims and losses climb, it’s clear that preventive security should be prioritized more when designing a cyber insurance policy. Here’s why preventive security investments are cost effective and can lead to lower premiums.
網路安全快照: New Guide Explains How To Assess if Software Is Secure by Design, While NIST Publishes GenAI Risk Framework
Is the software your company wants to buy securely designed? A new guide outlines how you can find out. Meanwhile, a new NIST framework can help you assess your GenAI systems’ risks. Plus, a survey shows a big disconnect between AI usage (high) and AI governance (low). And MITRE’s breach post…
CVE-2024-21793、CVE-2024-26026:针对 F5 BIG-IP Next Central Manager 漏洞的概念验证现已可用
Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords.
網路安全快照: Attackers Pounce on Unpatched Vulns, DBIR Says, as Critical Infrastructure Orgs Benefit from CISA’s Alert Program
Verizon’s DBIR found that hackers are having a field day exploiting vulnerabilities to gain initial access. Plus, a CISA program is helping critical infrastructure organizations prevent ransomware attacks. In addition, check out what Tenable’s got planned for RSA Conference 2024. And get the latest…
As Pro-Russia Hacktivists Target OT Systems, Here’s What You Need To Know
U.S. and international cybersecurity and law enforcement agencies this week issued a joint fact sheet to highlight and safeguard against the continued malicious cyber activity conducted by pro-Russia hacktivists against operational technology (OT) devices in North America and Europe. Read on to get…
AI Security Solutions: Do You Really Need Another Security Product?
Cybersecurity leaders face a conundrum — more tools and alerts with less available talent to manage them — that is only intensifying with the proliferation of GenAI. Here’s what you need to know.