Shared Responsibility Model in the Cloud
CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture.
Tenable Cyber Watch: El gobierno de los EE. UU. Actualizaciones gubernamentales de guía de ransomware, estudio de linaje revela riesgos de la cadena de suministro en OSS y más
This week’s edition of the Tenable Cyber Watch unpacks the most recent updates to the U.S. government’s #StopRansomware Guide and addresses the steps organizations can take to boost digital trust. Also covered: why companies must be careful when using open source software.
Preguntas frecuentes de vulnerabilidades de transferencias MOVEit y CL0P Ransomware Gang
Frequently asked questions relating to vulnerabilities in MOVEit Transfer, including one that was exploited by the prolific CL0P ransomware gang.
Instantánea de ciberseguridad: Para una robusta seguridad en la nube, enfóquese en la configuración
Check out the NCSC’s advice about proper configuration in cloud security. Plus, a detailed guide about LockBit ransomware. Also, don’t miss OWASP’s revised list of top API security risks. Plus, CISA’s warning about remote network management tools. ¡Y mucho más!
CVE-2023-20887: VMware Aria Operations para inyección de comandos de redes
VMware issues advisory to address three flaws in its VMware Aria Operations for Networks solution, including a critical command injection flaw assigned a CVSSv3 score of 9.8.
El Martes de parches de Microsoft de junio de 2023 aborda 70 CVE (CVE-2023-29357)
Microsoft addresses 70 CVEs in its June 2023 Patch Tuesday update including six rated as critical.
CVE-2023-27997: Desbordamiento de búfer basado en la pila en Fortinet FortiOS y FortiProxy SSL-VPN (XORtigate)
Fortinet says a critical flaw in its SSL-VPN product may have been exploited in the wild in a limited number of cases. Organizations are strongly encouraged to apply these patches immediately.
Tenable Cyber Watch: Seis conceptos cibernéticos erróneos críticos y comunes, mejores prácticas para aumentar la seguridad de IAM y más
This week’s edition of the Tenable Cyber Watch unpacks the six most critical and common cyber misconceptions and shares tips on how to better distribute software bills of materials. Also covered: the best practices to boost IAM security from CISA and the NSA.
Instantánea de ciberseguridad: ¿Genera su propio ChatGPT? Aprenda cómo evitar los riesgos para la seguridad de los modelos de IA
Find out why cyber teams must get hip to AI security ASAP. Plus, check out the top risks of ChatGPT-like LLMs. Also, learn what this year’s Verizon DBIR says about BEC and ransomware. Plus, the latest trends on SaaS security. ¡Y mucho más!
Mastering the Art of Kubernetes Security
With Kubernetes’ explosive adoption by the development community comes an urgent need to secure clusters and ensure their compliance effectively.
¿Quiere saber más acerca de la gestión de exposición? Vea este informe de Gartner®
At Tenable, we believe that you need exposure management to protect your modern attack surface. But it’s not just us. We feel the Gartner “Predicts 2023: Enterprises Must Expand from Threat to Exposure Management” report is required reading for cybersecurity teams adopting an exposure management…
Tenable Cyber Watch: El ‘Volt Typhoon’ chino es usado para atacar a los EE. UU. Infraestructura crítica, los ataques BEC se disparan y más
This week’s edition of the Tenable Cyber Watch unpacks the White House’s updates to its National AI R&D Strategic Plan and addresses the recent surge in business email compromise scams. Also covered: CISA’s warning about Volt Typhoon, the hackers backed by the Chinese government that have been…