Blog de Tenable
Instantánea de ciberseguridad: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More
CVE-2025-14847 (MongoBleed): MongoDB Memory Leak Vulnerability Exploited in the Wild
A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed.
Instantánea de ciberseguridad: 2025 Rewind: Essential Cyber Insights, Strategies and Tactics
In this special year-end edition, we revisit critical advice from our cybersecurity experts on AI, exposure management, cloud, vulnerability management, OT, and critical infrastructure.
The 3% Rule: How To Silence 97% of Your Cloud Alerts and Be More Secure
Prioritizing what to fix first and why that really matters
Instantánea de ciberseguridad: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say
Formerly “AI shy” cyber pros have done a 180 and become AI power users, as AI forces data security changes, the CSA says. Plus, PwC predicts orgs will get serious about responsible AI usage in 2026, while the NCSC states that, no, prompt injection isn’t the new SQL injection. ¡Y mucho más!
CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited
A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild in a chained attack with CVE-2025-23006.
Complying with the Monetary Authority of Singapore’s Cloud Advisory: cómo puede ayudar Tenable
The Monetary Authority of Singapore’s cloud advisory, part of its 2021 Technology Risk Management Guidelines, advises financial institutions to move beyond siloed monitoring to adopt a continuous, enterprise-wide approach. These firms must undergo annual audits. Here’s how Tenable can help.
7 preguntas para desenmascarar a los barriles sin fondo en la gestión de exposición de "agente único"
Muchos proveedores de EDR están modernizando sus herramientas y etiquetándolas como “gestión de exposición”. No se deje engañar: estas ofertas a menudo ocultan costos inesperados y crean puntos ciegos peligrosos. Utilice estas siete preguntas para encontrar una plataforma de gestión de exposición que ofrezca un valor real y escalable.
Security for AI: How Shadow AI, Platform Risks, and Data Leakage Leave Your Organization Exposed
Your employees are using AI whether you’ve sanctioned it or not. And even if you’ve carefully vetted and approved an enterprise-grade AI platform, you’re still at risk of attacks and data leakage.
Instantánea de ciberseguridad: OWASP Ranks Top Agentic AI App Risks, as CISA Lists Most Dangerous Software Flaws
Check out the most critical threats to agentic AI applications, and then dive into the worst software weaknesses of 2025. Plus, learn about pro-Russia hacktivists’ attacks against critical infrastructure; AI governance best practices for boards; and NCSC’s updated security-certificate guidance.