Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

August 11, 2025

Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI’s New Safety Tech

Within just 24 hours of the release of OpenAI’s GPT-5, Tenable Research successfully managed to jailbreak the model by getting it to share detailed instructions for how to build an explosive. Our finding is concerning, given that OpenAI described GPT-5's prompt safety technology as significantly more sophisticated than the one used by its predecessors.

May 12, 2023

网络安全快照: 如何增强客户对您的数字服务的信任度

Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. And much more!...


May 11, 2023

开源方式在云安全中所起的作用:Terrascan by Tenable 案例研究

Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...


May 9, 2023

Microsoft 的 2023 年 5 月星期二补丁解决了 38 个 CVE (CVE-2023-29336)

Microsoft addresses 38 CVEs including three zero-day vulnerabilities, two of which were exploited in the wild....


May 9, 2023

Tenable Security Center 与 Tenable One 集成为本地客户提供全面的风险暴露管理功能

通过 Tenable Security Center 与 Tenable One 集成,Tenable 成为唯一一家为本地和混合部署模式提供风险暴露管理的供应商。Here’s what you need to know. ...


May 9, 2023

注意差距:等待 NVD 会给企业带来怎样的风险

This is the first of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. We explore the impact of that gap on an organization’s cyber risk and discuss how Tenable can help....


May 9, 2023

注意差距:现有的漏洞框架如何让企业暴露在风险之下

This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and dis...


May 9, 2023

注意差距:A Closer Look at the Vulnerabilities Disclosed in 2022

This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable ca...


May 9, 2023

注意差距:A Closer Look at Eight Notable CVEs from 2022

This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss how...


May 8, 2023

Tenable 网络观察:Nearly 50% of Workers Have Accessed Ex-Employers’ Accounts, Biden Seeks Your Input on AI Accountability, and more

This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have ...


您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

了解勒索软件生态系统

下载报告 >