Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

July 28, 2022

The Ransomware Ecosystem: In Pursuit of Fame and Fortune

The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune....


Julio de 22, 2022

Recomendaciones de Zero Trust de NSTAC Aces para proteger a las entidades gubernamentales

Kudos to the National Security Telecommunications Advisory Committee for its report on boosting zero trust and ID management. As the Biden administration looks to implement its recommendations, a strong focus on vulnerability management would optimize opportunities for success....


Julio de 20, 2022

La actualización de parches críticos de Oracle de julio de 2022 aborda 188 CVE

Oracle addresses 188 CVEs in its third quarterly update of 2022 with 349 patches, including 66 critical updates....


Julio de 20, 2022

Osado, ilógico y poco sofisticado: cómo comprender el grupo extorsivo LAPSUS$

Después de obtener la atención de la industria en los primeros meses de 2022, el grupo extorsivo LAPSUS$ ha permanecido considerablemente inactivo. What can we learn from this extortion group’s story and tactics?...


Julio de 15, 2022

Instantánea de ciberseguridad: Seis cosas que importan ahora

Topics that are top of mind for the week ending July 15 | Government cybersecurity efforts tripped by technical debt. Neglect SaaS security at your own risk. A ranking of the most dangerous software weaknesses. Lessons learned about critical infrastructure security. And much more!...


Julio de 14, 2022

Securing Critical Infrastructure: What We've Learned from Recent Incidents

Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure —from Phone Phreaking to recent ransomware....


Julio de 12, 2022

Microsoft’s July 2022 Patch Tuesday Addresses 84 CVEs (CVE-2022-22047)

Microsoft addresses 84 CVEs in its July 2022 Patch Tuesday release, including four critical flaws and one zero day that has been exploited in the wild....


Julio de 12, 2022

Presentamos Nessus Expert, ahora diseñado para la superficie de ataque moderna

Nessus ha sido durante mucho tiempo el líder indiscutible en evaluación de vulnerabilidades. With the introduction of Nessus Expert, you can now protect against new, emerging cyberthreats across cloud infrastructure and understand what's in your external attack surface....


July 5, 2022

Cloud and Data Security for Financial Services

Financial service organizations are adopting the cloud at a rapid pace. A robust solution for compliance and cloud security will ensure they enjoy all the benefits....


Julio de 1, 2022

Instantánea de ciberseguridad: Seis cosas que importan ahora

Topics that are top of mind for the week ending July 1 | Cybersecurity budgeting priorities. All you ever wanted to know about ransomware. CISOs weigh best-of-breed vs. platforms. The epidemic of identity-related breaches. And much more!...


June 30, 2022

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month. ...


June 23, 2022

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology

The latest research from Forescout’s Vedere Labs explores the state of risk management in operational technology through the lens of 56 insecure-by-design vulnerabilities....


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >