Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

April 6, 2026

CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild

Exploitation has been observed for CVE-2026-35616, a critical improper access control zero-day vulnerability affecting Fortinet FortiClientEMS devices.

December 11, 2024

La nueva Guía de refuerzo de la CISA proporciona información valiosa para los ingenieros de seguridad de red

Recent guidance from CISA and the FBI highlights best practices to monitor and harden network infrastructure. The guidance, published in response to high-profile attacks on telecom infrastructure, is applicable to a wider audience. This blog unpacks important points and explains how Tenable…


December 10, 2024

Revisión anual del Martes de parches de Microsoft 2024

Microsoft addressed over 1000 CVEs as part of Patch Tuesday releases in 2024, including 22 zero-day vulnerabilities.


December 10, 2024

El Martes de parches de diciembre de 2024 de Microsoft aborda 70 CVE (CVE-2024-49138)

Microsoft addresses 70 CVEs with 16 rated critical, including one zero-day that was exploited in the wild.


December 9, 2024

Data Security in Healthcare: How Tenable Cloud Security Can Help

Healthcare is one of the most highly regulated industry sectors in the world. Adhering to compliance standards while also ensuring optimal patient experiences is a challenge. DSPM capabilities in Tenable Cloud Security can ease the burden on cybersecurity teams.


December 6, 2024

Instantánea de ciberseguridad: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks

Don’t miss the Linux Foundation’s deep dive into open source software security. Plus, cyber agencies warn about China-backed cyber espionage campaign targeting telecom data. Meanwhile, a study shows the weight of security considerations in generative AI projects. And get the latest on ransomware…


December 5, 2024

Haciendo que la arquitectura de Zero Trust sea lograble

How NIST is working with Tenable and other private sector stakeholders to better enable zero trust implementation.


December 2, 2024

Si solo tiene 1 minuto: Consejos rápidos para una respuesta eficaz a la exposición

Comprehensive, action-oriented workflows and key metrics are the cornerstones of a successful exposure response program. Esto es lo que debe saber. 


December 2, 2024

Si solo tiene 5 minutos: prácticas recomendadas para establecer SLA de respuesta a exposición

Keeping vulnerability management efforts focused on achievable goals is key to avoiding cybersecurity team burnout. Here’s how exposure response workflows and SLAs can help.


December 2, 2024

Si solo tiene 5 minutos: elementos clave de una respuesta a la exposición eficaz

Learned helplessness and lack of prioritization are two vulnerability management pitfalls cybersecurity teams face. Here’s how an exposure response program can help.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.