Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.

May 9, 2024

CVE-2024-21793, CVE-2024-26026: prueba de concepto disponible para vulnerabilidades de F5 BIG-IP Next Central Manager

Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords.


May 3, 2024

Instantánea de ciberseguridad: Attackers Pounce on Unpatched Vulns, DBIR Says, as Critical Infrastructure Orgs Benefit from CISA’s Alert Program

Verizon’s DBIR found that hackers are having a field day exploiting vulnerabilities to gain initial access. Plus, a CISA program is helping critical infrastructure organizations prevent ransomware attacks. In addition, check out what Tenable’s got planned for RSA Conference 2024. And get the latest…


May 2, 2024

As Pro-Russia Hacktivists Target OT Systems, Here’s What You Need To Know

U.S. and international cybersecurity and law enforcement agencies this week issued a joint fact sheet to highlight and safeguard against the continued malicious cyber activity conducted by pro-Russia hacktivists against operational technology (OT) devices in North America and Europe. Read on to get…


May 2, 2024

AI Security Solutions: Do You Really Need Another Security Product?

Cybersecurity leaders face a conundrum — more tools and alerts with less available talent to manage them — that is only intensifying with the proliferation of GenAI. Here’s what you need to know.


May 1, 2024

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution…


April 26, 2024

Instantánea de ciberseguridad: la última actualización de MITRE ATT&CK ofrece conocimiento de seguridad en GenAI, identidad, nube y CI/CD

Check out what’s new in Version 15 of the MITRE ATT&CK knowledge base of adversary tactics, techniques and procedures. Plus, learn the latest details about the Change Healthcare breach, including the massive scope of the data exfiltration. In addition, why AI cyberthreats aren’t impacting CISOs’…


April 25, 2024

CVE-2024-20353, CVE-2024-20359: preguntas frecuentes acerca de ArcaneDoor

Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances.


April 23, 2024

CVE-2024-4040: vulnerabilidad de escape de entorno aislado de CrushFTP Virtual File System (VFS) explotada

A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible.


April 19, 2024

Tecnología operativa en el Departamento de Defensa de los EE. UU.: garantizar una red eléctrica segura y eficiente

In an evolving threat landscape, the DoD must make sure that its mission-critical operations don’t experience power outages.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.