How Attackers Can Exploit GCP’s Multicloud Workload Solution
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations....
ProxyNotShell, OWASSRF, TabShell: Coloque parches en sus Microsoft Exchange Servers Now
Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended....
Tenable Cyber Watch: Qué piensan los CISO acerca de sus trabajos, por qué los desarrolladores luchan con la seguridad, uso de IA para reducir el riesgo
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back. Ever wonder how happy your CISO is at ...
Sandworm APT implementa el nuevo SwiftSlicer Wiper usando la directiva de grupo de Active Directory
Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer....
Instantánea de ciberseguridad: Los proveedores de IoT fallan en las divulgaciones de vulnerabilidades, mientras que las amenazas cibernéticas nuevamente son los principales riesgos para los negocios
Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!...
Cómo el análisis de sus datos de superficie de ataque externa impulsa su estrategia de seguridad
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....
Tenable.sc 6.0: Una actualización importante que aumenta la visibilidad y la productividad
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...
Tenable Cyber Watch: La ciberseguridad está entre los 10 principales riesgos globales del Foro Económico Mundial, las preocupaciones cibernéticas siguen obstaculizando el valor de la nube y más
We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity. Happy Monday! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, t...
Instantánea de ciberseguridad: Los CISO están más felices, pero los equipos de desarrollo todavía carecen de habilidades de codificación segura
Learn all about the spike in CISO job satisfaction. Plus, NIST mulls major makeover of its Cybersecurity Framework. Also, the struggle to develop secure apps is real. Then check out how Uncle Sam plans to use AI and ML to boost cybersecurity. And much more!...
EmojiDeploy: Smile! Your Azure web service just got RCE’d ._.
The Tenable Cloud Security research team discovered a remote code execution vulnerability affecting Microsoft Azure cloud services such as Function Apps, App Service, Logic Apps and others, as well as other cloud sovereigns....
La actualización de parche crítico de Oracle para enero de 2023 aborda 183 CVE
Oracle addresses 183 CVEs in its first quarterly update of quarterly with 327 patches, including 71 critical updates....
No puede reparar todo: cómo adoptar un abordaje basado en el riesgo para la corrección de vulnerabilidades
Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help....