Tenable Cyber Watch: Los líderes cibernéticos priorizan la detección y la prevención, los 3 principales malware en el 2o trimestre y más
This week’s edition of Tenable Cyber Watch unpacks security leaders' top cybersecurity priorities and addresses why software products must be secure by design. Also covered: The top 3 malware in Q2. ...
Cómo realizar evaluaciones de vulnerabilidad eficientes con Tenable
Policy configuration choices in vulnerability assessment tools like Tenable Nessus, Tenable Security Center and Tenable Vulnerability Management enable security professionals to effectively gather data that can be analyzed to aid in prioritizing remediation....
CVE-2023-20269: Vulnerabilidad de día cero en Cisco Adaptive Security Appliance y Firepower Threat Defense supuestamente explotada por grupos de ransomware
Ransomware groups including LockBit and Akira are reportedly exploiting a zero-day vulnerability in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances with VPN functionality enabled....
The Azure Metadata Protection You Didn’t Know Was There
Some Azure services have an additional, not widely known, protection mechanism against session token exfiltration....
Instantánea de ciberseguridad: Los profesionales cibernéticos sufren exceso de trabajo, falta de personal y falta de apoyo, y el estrés es considerable
Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Check out what a study found. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. Plus, the U.S. government is alerting about exploits to CVE-2022-47966 and CVE-2022-42475. We als...
AA23-250A: Múltiples agentes maliciosos de estados nación explotan CVE-2022-47966 y CVE-2022-42475
A joint Cybersecurity Advisory examines the exploitation of two critical vulnerabilities by nation-state threat actors....
El plan de adquisición de Ermetic por parte de Tenable acelerará el valor del cliente en CNAPP y gestión de exposición
The acquisition of cloud security innovator Ermetic, once completed, will add unified, elegantly integrated CNAPP and market-leading CIEM capabilities to the Tenable portfolio....
Trayecto hacia las cargas de trabajo contenerizadas: Trampas de seguridad y cómo evitarlas con Tenable Cloud Security
Tenable Cloud Security now includes built-in container security functionality, so you can detect and prevent insecure containers from being deployed to production. In this blog, you’ll learn how Tenable can help you avoid critical container security mistakes. ...
Tenable Cyber Watch: CISA insta a los equipos cibernéticos a prepararse para ataques cuánticos, ataques de ransomware y más
This week’s edition of Tenable Cyber Watch unpacks the emerging threat of quantum computers and the recommended steps security teams should take, and addresses the surge in ransomware attacks. Also covered: The White House and other cyber agencies seek public input on how to best secure open source...
Instantánea de ciberseguridad: "Reduzca su entusiasmo por las herramientas de ChatGPT en el trabajo", dijo NCSC del Reino Unido
As OpenAI released ChatGPT Enterprise, the U.K.’s cyber agency warned about the risks of workplace use of AI chatbots. Plus, the QakBot botnet got torn down, but the malware threat remains – what CISA suggests you do. Moreover, new quantum-resistant algorithms are due next year. And much more!...
CVE-2023-2868: Barracuda y FBI recomiendan reemplazar dispositivos de puerta de enlace de seguridad de correo electrónico (ESG) ahora mismo
Since October 2022, attackers have been exploiting a zero-day vulnerability in Barracuda Email Security Gateway devices, and both the vendor and the FBI urge customers to replace these devices immediately....
The Benefits of Cloud Entitlement Management
Cloud identities and entitlements pose grave challenges - learn about the benefits of CIEM solutions and KPIs for measuring them....