Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

August 1, 2025

Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

September 28, 2023

CISA agrega vulnerabilidades explotables vía Bluetooth a KEV

Updated Oct. 5: As of Oct. 4, 2023, CISA has removed the five Owl Labs vulnerabilities from KEV. CISA notes that it "is continually collaborating with partners across government and the private sector. As a result of this collaboration, CISA has concluded that there is insufficient evidence to keep ...


September 28, 2023

Empoderamiento de la excelencia en ciberseguridad: IBM y Tenable colaboran para la innovación en seguridad de TI/OT

IBM and Tenable put IT/OT security on display at IBM's Watson Center in Munich with the QRadar and Tenable OT Security integration — showcasing industrial security, protection and asset management for joint customers and partners....


September 27, 2023

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Preguntas frecuentes sobre las vulnerabilidades de día cero de ImageIO y WebP/libwebp

Frequently asked questions relating to vulnerabilities in Apple, Google and the open source libwebp library....


September 27, 2023

Building Custom Scenarios with CNAPPgoat

You can now construct and import your own vulnerability scenarios into CNAPPgoat, enhancing your cloud security skills....


September 27, 2023

CVE-2023-29357, CVE-2023-24955: cadena de vulnerabilidades dada a conocer para vulnerabilidades de Microsoft SharePoint Server

A proof-of-concept exploit chain has been released for two vulnerabilities in Microsoft SharePoint Server that can be exploited to achieve unauthenticated remote code execution....


September 25, 2023

Tenable Cyber Watch: El gobierno de los EE. UU. asesora sobre amenazas Deepfake, mejores prácticas para proteger sistemas de IA y más

This week’s edition of Tenable Cyber Watch unpacks preparing for deepfake threats and addresses CISA’s roadmap for open source security. Also covered: tips and best practices for securing AI systems. Why is the U.S. government urging organizations to prepare for deepfake threats? Curious to know ...


September 23, 2023

What’s New with CNAPPgoat?

Read about the newest, expanded features in the Tenable Cloud Security open source vulnerable-by-design tool for enhancing your security skills....


September 22, 2023

Instantánea de ciberseguridad: DHS rastrea nuevas tendencias de ransomware, a medida que los ataques aumentan las reclamaciones de seguros cibernéticos y variante de Snatch desencadena alerta

Check out the new ransomware trends documented by DHS, as well as a joint CISA-FBI alert about the Snatch ransomware. Plus, find out what CISA has in store for its Known Exploited Vulnerabilities catalog. Furthermore, don’t miss new source-code management tips from the OpenSSF. And much more!...


September 21, 2023

The MGM Breach and the Role of IdP in Modern Cyber Attacks

A deep dive into the recent MGM breach and our insights into the actor behind the attack and possible mitigations....


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >