Nuevo requisito de plan de seguridad SLCGP: adopte las mejores prácticas de ciberseguridad utilizando los CPG de CISA
This is the second of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP....
CVE-2023-40044, CVE-2023-42657: Progress Software coloca parches en múltiples vulnerabilidades en WS_FTP Server
Progress Software patches multiple flaws in its WS_FTP Server product, including a pair of critical flaws, one with a maximum CVSS rating of 10...
Tenable Cyber Watch: DHS rastrea nuevas tendencias de ransomware a medida que los ataques aumentan las reclamaciones de seguros cibernéticos y más
This week’s edition of Tenable Cyber Watch unpacks new ransomware trends spotted by the U.S. Department of Homeland Security and addresses the surge in cyber insurance claims due to ransomware attacks. Also covered: A look into Snatch. Why is CISA warning critical infrastructure organizations about ...
Instantánea de ciberseguridad: Los CISO observan ajustes de presupuestos al mismo tiempo que las amenazas cibernéticas se intensifican
After double-digit growth in the past two years, cybersecurity budgets expanded more modestly in 2023. Plus, a survey offers an inside look at how organizations are grappling with cyber challenges. In addition, the U.S. and Japan warn about a China-linked group that’s stealthily compromising network...
CISA agrega vulnerabilidades explotables vía Bluetooth a KEV
Updated Oct. 5: As of Oct. 4, 2023, CISA has removed the five Owl Labs vulnerabilities from KEV. CISA notes that it "is continually collaborating with partners across government and the private sector. As a result of this collaboration, CISA has concluded that there is insufficient evidence to keep ...
Empoderamiento de la excelencia en ciberseguridad: IBM y Tenable colaboran para la innovación en seguridad de TI/OT
IBM and Tenable put IT/OT security on display at IBM's Watson Center in Munich with the QRadar and Tenable OT Security integration — showcasing industrial security, protection and asset management for joint customers and partners....
CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Preguntas frecuentes sobre las vulnerabilidades de día cero de ImageIO y WebP/libwebp
Frequently asked questions relating to vulnerabilities in Apple, Google and the open source libwebp library....
Building Custom Scenarios with CNAPPgoat
You can now construct and import your own vulnerability scenarios into CNAPPgoat, enhancing your cloud security skills....
CVE-2023-29357, CVE-2023-24955: cadena de vulnerabilidades dada a conocer para vulnerabilidades de Microsoft SharePoint Server
A proof-of-concept exploit chain has been released for two vulnerabilities in Microsoft SharePoint Server that can be exploited to achieve unauthenticated remote code execution....
Tenable Cyber Watch: El gobierno de los EE. UU. asesora sobre amenazas Deepfake, mejores prácticas para proteger sistemas de IA y más
This week’s edition of Tenable Cyber Watch unpacks preparing for deepfake threats and addresses CISA’s roadmap for open source security. Also covered: tips and best practices for securing AI systems. Why is the U.S. government urging organizations to prepare for deepfake threats? Curious to know ...
What’s New with CNAPPgoat?
Read about the newest, expanded features in the Tenable Cloud Security open source vulnerable-by-design tool for enhancing your security skills....
Instantánea de ciberseguridad: DHS rastrea nuevas tendencias de ransomware, a medida que los ataques aumentan las reclamaciones de seguros cibernéticos y variante de Snatch desencadena alerta
Check out the new ransomware trends documented by DHS, as well as a joint CISA-FBI alert about the Snatch ransomware. Plus, find out what CISA has in store for its Known Exploited Vulnerabilities catalog. Furthermore, don’t miss new source-code management tips from the OpenSSF. And much more!...