Microsoft Azure Synapse Pwnalytics
Since March 10, Tenable Research has attempted to work with Microsoft to address two serious flaws in the underlying infrastructure of Azure Synapse Analytics....
So Many CVEs, So Little Time: Zero In and ‘Zero Click’ into the Current Vulnerability Landscape
Among the thousands of vulnerabilities disclosed so far in 2022, we highlight five and explain why they matter....
Twitter Crypto Scams: Bored Ape Yacht Club, Azuki and Other Projects Impersonated to Steal NFTs, Digital Currencies
Scammers are using verified and unverified accounts to impersonate notable NFT projects like Bored Ape Yacht Club and others, tagging Twitter users to drive them to phishing websites....
Behind the Scenes: How We Picked 2021’s Top Vulnerabilities – and What We Left Out
The 2021 Threat Landscape Retrospective explored the top five vulnerabilities of the year. Learn about other high-impact vulnerabilities that nearly made our list. When putting together the Threat Landscape Retrospective (TLR) for 2021, the Security Response Team had a particularly difficult chal...
Panorama de amenazas del 2021, una retrospectiva: enfoque en las vulnerabilidades que importan más
A review of the year in vulnerabilities and breaches, with insights to help guide cybersecurity strategy in 2022 and beyond....
YouTube Shorts: Stolen TikTok Videos Manipulated in Adult Dating, Dubious Products Scams for Views and Subscribers
As Google's TikTok competitor YouTube Shorts gains viewers, hordes of scammers are quick to follow....
Fake Bitcoin, Ethereum, Dogecoin, Cardano, Ripple and Shiba Inu Giveaways Proliferate on YouTube Live
Scammers are leveraging compromised YouTube accounts to promote fake cryptocurrency giveaways for Bitcoin, Ethereum, Dogecoin, Cardano, Ripple, Shiba Inu and other cryptocurrencies....
Identifying Server Side Request Forgery: How Tenable.io Web Application Scanning Can Help
Learn how SSRF flaws arise, why three common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help....
Estafas de TikTok LIVE: Imágenes en vivo robadas que se utilizan para obtener obsequios de TikTok y promover estafas para ganar dinero
Stolen video footage of celebrities, content creators and others is being used by scammers in TikTok LIVE streams to earn TikTok gifts, peddle questionable products and drive users to adult dating websites....
Estafas de publicidad digital sobre Elon Musk en YouTube: una "moneda" falsa de SpaceX se promociona en anuncios de videos de criptomonedas
Scammers are on pace to steal nearly $1 million USD from unsuspecting users through a popular decentralized finance protocol, Uniswap, by abusing YouTube to promote a fake SpaceX coin as part of ads appearing before and during cryptocurrency videos.BackgroundIn early May, scammers compromised Twitte...
Understanding Cross-Origin Resource Sharing Vulnerabilities
To avoid exposure to a variety of web application vulnerabilities, specific security considerations must be made when implementing Cross-Origin Resource SharingToday’s modern web applications rely heavily on JavaScript to be dynamic, and ensure the best experience for end-users. Providing content an...
Las estafas explotan obsequios para COVID-19 vía Venmo, PayPal y Cash App
The economic impact of COVID-19, which is causing record unemployment, creates a golden opportunity for scammers looking to target vulnerable people desperate for cash to help pay their bills.As Cash App steps up the frequency of its giveaways, and celebrities and other notable figures launch giveaw...