Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

July 29, 2025

Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats.

August 27, 2024

Secure Your Sprawling Attack Surface With Risk-based Vulnerability Management

The cloud, artificial intelligence (AI), machine learning and other technological breakthroughs are radically changing the modern work environment. New assets and services offer increased flexibility, growth potential and access to more resources. However, they also introduce new security risks. Man...


August 27, 2024

通过 FCC Cybersecurity Pilot Program(FCC 网络安全试点计划为)K-12 学校和图书馆提供 2 亿美元网络安全资金

Empowering K-12 schools and libraries to strengthen their cybersecurity posture with new funding opportunities and best practices. ...


August 26, 2024

CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It?

Conventional wisdom suggests the keys to protect critical infrastructure against cyberattacks are network segmentation and OT security. But continued breaches imply those methods alone fall short. In fact, a CISA probe of 121 critical infrastructure networks found that their weakest link is identity...


August 23, 2024

網路安全快照: Guide Unpacks Event-Logging Best Practices, as FAA Proposes Stronger Cyber Rules for Airplanes

Looking to sharpen your team’s event logging and threat detection? A new guide offers plenty of best practices. Plus, the FAA wants airplanes to be more resilient to cyberattacks. Meanwhile, check out the critical vulnerabilities Tenable discovered in two Microsoft AI products. And get the latest on...


August 20, 2024

SSRFing the Web with the Help of Copilot Studio

Tenable Research discovered a critical information-disclosure vulnerability in Microsoft’s Copilot Studio via a server-side request forgery (SSRF), which allowed researchers access to potentially sensitive information regarding service internals with potential cross-tenant impact....


By  Evan Grant
August 16, 2024

網路安全快照: First Quantum-resistant Algorithms Ready for Use, While New AI Risks’ Database Is Unveiled

NIST has released the first encryption algorithms that can protect data against quantum attacks. Plus, MIT launched a new database of AI risks. Meanwhile, the CSA published a paper outlining the unique risks involved in building systems that use LLMs. And get the latest on Q2’s most prevalent malwar...


August 14, 2024

CVE-2024-7593:Ivanti Virtual Traffic Manager 身份验证绕过漏洞

Ivanti released a patch for a critical severity authentication bypass vulnerability and a warning that exploit code is publicly available...


August 13, 2024

Microsoft 2024 年 8 月补丁星期二解决了 88 个 CVE

Microsoft addresses 88 CVEs with seven critical vulnerabilities and 10 zero-day vulnerabilities, six of which were exploited in the wild....


August 13, 2024

Compromising Microsoft's AI Healthcare Chatbot Service

Tenable Research discovered multiple privilege-escalation issues in the Azure Health Bot Service via a server-side request forgery (SSRF), which allowed researchers access to cross-tenant resources....


您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

了解勒索软件生态系统

下载报告 >