Tenable 博客
CVE-2025-53786: Frequently Asked Questions About Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability

The Time Is Now for the U.S. Government To Help Africa Boost Cybersecurity
African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. ...
How Attackers Can Exploit GCP’s Multicloud Workload Solution
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations....
ProxyNotShell, OWASSRF, TabShell: Patch Your Microsoft Exchange Servers Now
Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended....
Tenable 网络观察:How CISOs Feel About Their Jobs, Why Devs Struggle with Security, Using AI to Reduce Risk
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back. Ever wonder how happy your CISO is at ...
Sandworm APT 使用 Active Directory 组策略部署新的 SwiftSlicer Wiper
Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer....
網路安全快照: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks
Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!...
分析外部攻击面数据如何提升您的安全策略
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....
Tenable.sc 6.0: A Major Update that Boosts Visibility and Productivity
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...
Tenable 网络观察:Cybersecurity Among World Economic Forum’s Top 10 Global Risks, Cyber Concerns Still Hamper Cloud Value, and More
We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity. Happy Monday! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, t...