The MGM Breach and the Role of IdP in Modern Cyber Attacks
A deep dive into the recent MGM breach and our insights into the actor behind the attack and possible mitigations....
Tenable fue nombrada líder en gestión del riesgo de vulnerabilidades por una firma de investigación independiente
“Tenable fija las tendencias para la seguridad proactiva”, de acuerdo a The Forrester Wave™: Vulnerability Risk Management, Q3 2023...
Tenable Cyber Watch: El gobierno de los EE. UU. insta a la industria espacial a mantenerse alerta, los empleos cibernéticos se vuelven más difíciles y más
This week’s edition of Tenable Cyber Watch unpacks safeguarding the US space industry and addresses why many cyber pros feel their jobs have gotten more difficult. Also covered: Three quantum-resistant algorithms that can protect data from quantum computer attacks....
Instantánea de ciberseguridad: Obtenga lo último en amenazas de Deepfake, los riesgos del código abierto, seguridad de sistemas de IA...
Tasked with securing your org’s new AI systems? Check out a new Google paper with tips and best practices. Plus, open source security experts huddled at a conference this week – find out what they talked about. Also, Uncle Sam says it’s time to prep for deepfake attacks. And much more!...
Martes de parches de Microsoft de septiembre de 2023 aborda 61 CVE (CVE-2023-36761)
Microsoft addresses 61 CVEs including two vulnerabilities that were exploited in the wild...
Tenable y Cyversity forman una alianza en el Programa de Preparación de Examen CISSP
Tenable is now accepting applicants for its training scholarship dedicated to supporting cybersecurity professionals from diverse backgrounds in their preparation for the CISSP exam Diversity, equity and inclusion (DEI) is a priority at Tenable. We strive to be a career destination in which individ...
Tenable Cyber Watch: Los líderes cibernéticos priorizan la detección y la prevención, los 3 principales malware en el 2o trimestre y más
This week’s edition of Tenable Cyber Watch unpacks security leaders' top cybersecurity priorities and addresses why software products must be secure by design. Also covered: The top 3 malware in Q2. ...
Cómo realizar evaluaciones de vulnerabilidad eficientes con Tenable
Policy configuration choices in vulnerability assessment tools like Tenable Nessus, Tenable Security Center and Tenable Vulnerability Management enable security professionals to effectively gather data that can be analyzed to aid in prioritizing remediation....
CVE-2023-20269: Vulnerabilidad de día cero en Cisco Adaptive Security Appliance y Firepower Threat Defense supuestamente explotada por grupos de ransomware
Ransomware groups including LockBit and Akira are reportedly exploiting a zero-day vulnerability in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances with VPN functionality enabled....
The Azure Metadata Protection You Didn’t Know Was There
Some Azure services have an additional, not widely known, protection mechanism against session token exfiltration....
Instantánea de ciberseguridad: Los profesionales cibernéticos sufren exceso de trabajo, falta de personal y falta de apoyo, y el estrés es considerable
Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Check out what a study found. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. Plus, the U.S. government is alerting about exploits to CVE-2022-47966 and CVE-2022-42475. We als...
AA23-250A: Múltiples agentes maliciosos de estados nación explotan CVE-2022-47966 y CVE-2022-42475
A joint Cybersecurity Advisory examines the exploitation of two critical vulnerabilities by nation-state threat actors....