Blog de Tenable
Dynamic Objects in Active Directory: The Stealthy Threat
Suba de nivel su estrategia de seguridad en la nube
Learn how to better your cloud security program with these ten security resolutions.
Instantánea de ciberseguridad: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response
Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. Plus, the challenges stressing out CISOs are also opening new doors for them. In addition, the latest on the Androxgh0st malware…
Aproveche sus registros internos para mejorar su detección de anomalías y su respuesta ante incidentes
Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks.
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.
La actualización de parche crítico de Oracle para enero de 2024 aborda 191 CVE
Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates.
CVE-2023-6548, CVE-2023-6549: vulnerabilidades de día cero explotadas en Citrix NetScaler ADC y NetScaler Gateway
Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws.
Más allá del horizonte: Las 5 principales tendencias de seguridad en la nube para observar en 2024
La IA generativa sin duda impulsará las capacidades de ciberseguridad de las organizaciones. Sin embargo, los departamentos de ciberseguridad obtendrán pocos beneficios de la IA generativa sin primero aplicar principios sólidos de seguridad en la nube. In this blog, we explain the top cloud security trends that organizations must track –…
Instantánea de ciberseguridad: cómo impulsar la ciberseguridad de los sistemas de IA mientras se minimizan los riesgos
Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and…
CVE-2023-46805, CVE-2024-21887: vulnerabilidades de Zero-Day explotadas en Ivanti Connect Secure y Policy Secure Gateways
Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors.