Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

December 17, 2025

CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild in a chained attack with CVE-2025-23006.

April 16, 2025

Actualización de parche crítica de abril de 2025 de Oracle aborda 171 CVE

Oracle addresses 171 CVEs in its second quarterly update of 2025 with 378 patches, including 40 critical updates.BackgroundOn April 15, Oracle released its Critical Patch Update (CPU) for April 2025, the second quarterly update of the year. This CPU contains fixes for 171 unique CVEs in 378…


April 15, 2025

El financiamiento del programa MITRE CVE es ampliado por un año

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. While CISA secured funding on April 16 to extend the program for the next year, the lack of clarity surrounding its long-term future creates great uncertainty about how newly discovered vulnerabilities will be…


April 14, 2025

You Have Exposure Management Questions. We’ve Got Answers

Todos los lunes, la Exposure Management Academy de Tenable ofrece la orientación práctica y del mundo real que necesita para pasar de la gestión de vulnerabilidades a la gestión de exposición. In this post, we feature the first Exposure Management Academy FAQ. We’ll run these FAQs from time to time to share some of the…


April 11, 2025

Geopolitics Just Cranked Up Your Threat Model, Again. Here’s What Cyber Pros Need to Know

If it feels like your entire cybersecurity program is once again operating on a geopolitical fault line, you're not imagining things.


April 11, 2025

Instantánea de ciberseguridad: Beware of Mobile Spyware Attacks, Cyber Agencies Warn, While Corporate Boards Get Cyber Governance Guidance

Check out why a global geopolitical spyware campaign could ensnare mobile users outside of its target groups. Plus, the U.K.’s cyber agency offers cyber governance resources to boards of directors. Also, find out what webinar attendees told Tenable about using port scanning and service discovery to…


April 10, 2025

Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications

The emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some security concerns. In this blog we address FAQs about…


April 9, 2025

Seguridad en la nube más robusta en cinco minutos: la importancia de la seguridad de la configuración en la nube

Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management.


April 8, 2025

El Martes de parches de Microsoft de abril de 2025 aborda 121 CVE (CVE-2025-29824)

Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild.


April 8, 2025

Cómo implementar acceso justo a tiempo: mejores prácticas y lecciones aprendidas

With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, we’ll share how we implemented JIT access internally at Tenable…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >

× Póngase en contacto con nuestro equipo de ventas