Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.

September 27, 2023

Building Custom Scenarios with CNAPPgoat

You can now construct and import your own vulnerability scenarios into CNAPPgoat, enhancing your cloud security skills.


September 27, 2023

CVE-2023-29357, CVE-2023-24955: cadena de vulnerabilidades dada a conocer para vulnerabilidades de Microsoft SharePoint Server

A proof-of-concept exploit chain has been released for two vulnerabilities in Microsoft SharePoint Server that can be exploited to achieve unauthenticated remote code execution.


September 25, 2023

Tenable Cyber Watch: El gobierno de los EE. UU. asesora sobre amenazas Deepfake, mejores prácticas para proteger sistemas de IA y más

This week’s edition of Tenable Cyber Watch unpacks preparing for deepfake threats and addresses CISA’s roadmap for open source security. Also covered: tips and best practices for securing AI systems. Why is the U.S. government urging organizations to prepare for deepfake threats? Curious to know…


September 23, 2023

What’s New with CNAPPgoat?

Read about the newest, expanded features in the Tenable Cloud Security open source vulnerable-by-design tool for enhancing your security skills.


September 22, 2023

Instantánea de ciberseguridad: DHS rastrea nuevas tendencias de ransomware, a medida que los ataques aumentan las reclamaciones de seguros cibernéticos y variante de Snatch desencadena alerta

Check out the new ransomware trends documented by DHS, as well as a joint CISA-FBI alert about the Snatch ransomware. Plus, find out what CISA has in store for its Known Exploited Vulnerabilities catalog. Furthermore, don’t miss new source-code management tips from the OpenSSF. ¡Y mucho más!


September 21, 2023

The MGM Breach and the Role of IdP in Modern Cyber Attacks

A deep dive into the recent MGM breach and our insights into the actor behind the attack and possible mitigations.


September 20, 2023

Tenable fue nombrada líder en gestión del riesgo de vulnerabilidades por una firma de investigación independiente

“Tenable fija las tendencias para la seguridad proactiva”, de acuerdo a The Forrester Wave™: Vulnerability Risk Management, 3er trimestre de 2023


September 18, 2023

Tenable Cyber Watch: El gobierno de los EE. UU. insta a la industria espacial a mantenerse alerta, los empleos cibernéticos se vuelven más difíciles y más

This week’s edition of Tenable Cyber Watch unpacks safeguarding the US space industry and addresses why many cyber pros feel their jobs have gotten more difficult. Also covered: Three quantum-resistant algorithms that can protect data from quantum computer attacks.


September 15, 2023

Instantánea de ciberseguridad: Obtenga lo último en amenazas de Deepfake, los riesgos del código abierto, seguridad de sistemas de IA...

Tasked with securing your org’s new AI systems? Check out a new Google paper with tips and best practices. Plus, open source security experts huddled at a conference this week – find out what they talked about. Also, Uncle Sam says it’s time to prep for deepfake attacks. ¡Y mucho más!


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.