Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

September 3, 2025

Synack + Tenable: AI-Powered Partnership Translates Vulnerability Insights into Action

The combined Synack/Tenable solution reduces alert noise for overloaded security teams, isolating the most exploitable threats so they can proactively close security gaps faster.

June 10, 2025

Microsoft 的 2025 年 6 月补丁星期二解决了 65 个 CVE (CVE-2025-33053)

Microsoft addresses 65 CVEs, including two zero-day vulnerabilities, with one being exploited in the wild.


June 9, 2025

如何在风险暴露管理计划中使用基于风险的指标

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security engineers Arnie Cabral and Jason Schavel share how you can use risk-based metrics.


June 6, 2025

網路安全快照: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO…


June 4, 2025

五步加强云安全:在 GCP 中提升 Kubernetes 安全的 3 个快捷方法

In this fifth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three best practices for quickly hardening your Kubernetes environment’s security in GCP: remove wide inbound access to cluster APIs; remove root permissions from containers; and remove privileged…


June 3, 2025

滥用客户端扩展 (CSE):您的 AD 环境存在后门

Crucial for applying Active Directory Group Policy Objects, client-side extensions (CSEs) are powerful but also present a significant, often overlooked, attack vector for persistent backdoors. Rather than cover well-documented common abuses of built-in CSEs, this article demonstrates how to create…


June 2, 2025

关于 BadSuccessor 的常见问题

Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.


June 2, 2025

突破信息孤岛,实施风险暴露管理

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable’s chief security officer Robert Huber looks at how exposure management can help you move beyond silos.


May 30, 2025

網路安全快照: New Standard for AI System Security Published, While Study Finds Cyber Teams Boost Value of Business Projects

Check out ETSI’s new global standard for securing AI systems and models. Plus, learn how CISOs and their teams add significant value to orgs’ major initiatives. In addition, discover what webinar attendees told Tenable about their cloud security challenges. And get the latest on properly…


May 29, 2025

对 AI 风险先发制敌:Tenable 后续计划

The acquisition of Apex Security adds a powerful new layer of visibility, context and control to the Tenable One Exposure Management Platform to govern usage, enforce policy and control exposure across both the AI that organizations use and the AI they build.


您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

了解勒索软件生态系统

下载报告 >