Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

September 25, 2025

CVE-2025-20333, CVE-2025-20362: Frequently Asked Questions About Zero-Day Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) Vulnerabilities

Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign.

August 18, 2025

How Tenable Moved From Siloed Security to Exposure Management

Todos los lunes, la Exposure Management Academy de Tenable ofrece la orientación práctica y del mundo real que necesita para pasar de la gestión de vulnerabilidades a la gestión de exposición. In the first of a two-part blog series, Tenable CSO Robert Huber shares how he and his team have guided the company to unified…


August 15, 2025

Instantánea de ciberseguridad: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices

CISA stresses that an asset inventory is the foundation for OT security. Meanwhile, NIST has finalized cryptographic algorithms for resource-constrained devices. The agency is also developing control overlays for AI systems. Plus, a report reveals that security budget growth has slowed to a five…


August 14, 2025

How Tenable One Helps Canadian Orgs Set Up Exposure Management Programs and Meet Compliance Demands

The Tenable One Exposure Management Platform provides a single source of truth for cyber risk, helping Canadian security teams shift from reactive patching to proactive risk reduction. With native support for Canadian data residency and alignment with frameworks like ITSG-33, Tenable One helps…


August 13, 2025

CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection Vulnerability

Exploit code is reportedly available for a critical command injection vulnerability affecting Fortinet FortiSIEM devices.BackgroundOn August 12, Fortinet published a security advisory (FG-IR-25-152) for CVE-2025-25256, a critical command injection vulnerability affecting Fortinet FortiSIEM…


August 13, 2025

How to Remediate Risk to Critical OT/IoT Systems without Disrupting Operations

Find out how adopting a proactive approach to secure your operational environments can help you reduce risk and eliminate downtime.


August 12, 2025

Microsoft’s August 2025 Patch Tuesday Addresses 107 CVEs (CVE-2025-53779)

Microsoft addresses 107 CVEs, including one zero-day vulnerability that was publicly disclosed.


August 12, 2025

From Vulnerability to Visibility: What the SharePoint Attacks Reveal About the Need for Proactive Cybersecurity

The recent exploitation of Microsoft SharePoint vulnerabilities highlights a critical gap in traditional, reactive cybersecurity strategies. Learn how a proactive exposure management approach empowers federal agencies to reduce risk, streamline operations and stay secure.


August 12, 2025

The Breach You Didn’t See Coming: How Invisible Combinations of Risk Are Exposing Your Organization

Most breaches don’t happen because of one glaring issue. They happen when multiple, seemingly low-risk factors silently combine. Learn how invisible risk combinations evade siloed security tools and how an exposure management program gives defenders the context they need to stop attacks before they…


August 11, 2025

Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI’s New Safety Tech

Within just 24 hours of the release of OpenAI’s GPT-5, Tenable Research successfully managed to jailbreak the model by getting it to share detailed instructions for how to build an explosive. Our finding is concerning, given that OpenAI described GPT-5's prompt safety technology as significantly…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >

× Póngase en contacto con nuestro equipo de ventas