Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

September 27, 2023

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Preguntas frecuentes sobre las vulnerabilidades de día cero de ImageIO y WebP/libwebp

Frequently asked questions relating to vulnerabilities in Apple, Google and the open source libwebp library.


September 27, 2023

Building Custom Scenarios with CNAPPgoat

You can now construct and import your own vulnerability scenarios into CNAPPgoat, enhancing your cloud security skills.


September 27, 2023

CVE-2023-29357, CVE-2023-24955: cadena de vulnerabilidades dada a conocer para vulnerabilidades de Microsoft SharePoint Server

A proof-of-concept exploit chain has been released for two vulnerabilities in Microsoft SharePoint Server that can be exploited to achieve unauthenticated remote code execution.


September 25, 2023

Tenable Cyber Watch: El gobierno de los EE. UU. asesora sobre amenazas Deepfake, mejores prácticas para proteger sistemas de IA y más

This week’s edition of Tenable Cyber Watch unpacks preparing for deepfake threats and addresses CISA’s roadmap for open source security. Also covered: tips and best practices for securing AI systems. Why is the U.S. government urging organizations to prepare for deepfake threats? Curious to know…


September 23, 2023

What’s New with CNAPPgoat?

Read about the newest, expanded features in the Tenable Cloud Security open source vulnerable-by-design tool for enhancing your security skills.


September 22, 2023

Instantánea de ciberseguridad: DHS rastrea nuevas tendencias de ransomware, a medida que los ataques aumentan las reclamaciones de seguros cibernéticos y variante de Snatch desencadena alerta

Check out the new ransomware trends documented by DHS, as well as a joint CISA-FBI alert about the Snatch ransomware. Plus, find out what CISA has in store for its Known Exploited Vulnerabilities catalog. Furthermore, don’t miss new source-code management tips from the OpenSSF. ¡Y mucho más!


September 21, 2023

The MGM Breach and the Role of IdP in Modern Cyber Attacks

A deep dive into the recent MGM breach and our insights into the actor behind the attack and possible mitigations.


September 20, 2023

Tenable fue nombrada líder en gestión del riesgo de vulnerabilidades por una firma de investigación independiente

“Tenable fija las tendencias para la seguridad proactiva”, de acuerdo a The Forrester Wave™: Vulnerability Risk Management, 3er trimestre de 2023


September 18, 2023

Tenable Cyber Watch: El gobierno de los EE. UU. insta a la industria espacial a mantenerse alerta, los empleos cibernéticos se vuelven más difíciles y más

This week’s edition of Tenable Cyber Watch unpacks safeguarding the US space industry and addresses why many cyber pros feel their jobs have gotten more difficult. Also covered: Three quantum-resistant algorithms that can protect data from quantum computer attacks.


September 15, 2023

Instantánea de ciberseguridad: Obtenga lo último en amenazas de Deepfake, los riesgos del código abierto, seguridad de sistemas de IA...

Tasked with securing your org’s new AI systems? Check out a new Google paper with tips and best practices. Plus, open source security experts huddled at a conference this week – find out what they talked about. Also, Uncle Sam says it’s time to prep for deepfake attacks. ¡Y mucho más!


September 12, 2023

Martes de parches de Microsoft de septiembre de 2023 aborda 61 CVE (CVE-2023-36761)

Microsoft addresses 61 CVEs including two vulnerabilities that were exploited in the wild


September 12, 2023

Tenable y Cyversity forman una alianza en el Programa de Preparación de Examen CISSP

Tenable is now accepting applicants for its training scholarship dedicated to supporting cybersecurity professionals from diverse backgrounds in their preparation for the CISSP exam Diversity, equity and inclusion (DEI) is a priority at Tenable. We strive to be a career destination in which…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Póngase en contacto con nuestro equipo de ventas