Media room
Tenable news, announcements and global media coverage
Bienvenido a la sala de prensa de Tenable. Lea nuestros últimos comunicados y cobertura de medios, busque información de contactos globales y descargue nuestro kit de medios a continuación.
Get the latest Tenable news
Desde lanzamientos de productos innovadores pasando por informes de investigación de la industria hasta alianzas estratégicas, obtenga las últimas noticias y los comunicados oficiales de Tenable directamente en su bandeja de entrada.
Comunicados de prensa
Tenable gana en la categoría de seguridad de IA en los 2025 Cybersecurity Excellence Awards
Tenable Empowers erex with Continuous Cybersecurity Protection, Eliminating Costly Outsourcing
Tenable Achieves FedRAMP Authorization for Tenable One and Tenable Cloud Security
Tenable obtiene la calificación Elite 5-Star en la Guía del Programa de Socios CRN 2025
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
China's cyber intrusions took a sinister turn in 2024
"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Russian Hackers Target Mozilla, Windows in New Exploit Chain
Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset.
Satnam Narang, senior research engineer at Tenable, said the attack underscores both the persistence of threat actors and the increasing difficulty of breaching browser defenses.
"With the adoption of sandbox technology in modern browsers, threat actors need to do more than just exploit a browser vulnerability alone," Narang said in a statement. "By combining a browser-based exploit along with a privilege escalation flaw, the RomCom threat actor was able to bypass the Firefox sandbox."
- Cyber Breaches
Apple warns 2 macOS zero-day vulnerabilities under attack
The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
Most widely exploited vulnerabilities in 2023 were zero days
While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.
Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.
- Cybersecurity
Russia's APT29 Mimics AWS Domains to Steal Windows Credentials
Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.
"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."
That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."
- Cyber Breaches
- Cybersecurity
'Several' US government agencies attacked through MOVEit flaw, CISA
Computing •Tenable CEO, Amit Yoran, shares his thoughts on the Clop Ransomware gang's tactics with Computing Magazine.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Nathan Wenzler discusses how ChatGPT can be used by cybercriminals
Ticker Insight •- Business
- Cyber Breaches
- Cybersecurity
Satnam Narang discusses insights from 2022 Threat Landscape Report
Ticker Insight •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Satnam Narang provides insights into old and new threats within the metaverse
Ticker Insight •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Tenable One offers MSSPs unified cyber exposure visibility, Tenable says
IT Europa •- Business
- Corporate News
- Cybersecurity
Microsoft serves smorgasbord of six zero-days
Computer Weekly •- Business
- Cybersecurity
- Vulnerability Management
Marty Edwards discusses ransomware on critical infrastructure
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
‘The internet’s on fire’ as techs race to fix software flaw
Associated Press •- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Cloud, Remote Work Will Change How IT Uses Vulnerability Scanners
Dark Reading •- Corporate News
- Cybersecurity
- Products
- Vulnerability Management
Tenable commends Australia's Ransomware Action Plan
TickerTV Australia •- Business
- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
- Vulnerability Management
Nobelium hackers now attack a different part of the supply chain, Microsoft says
Industrial Cyber •- Corporate News
- Cyber Breaches
- Cybersecurity
Adopting a Counter Ransomware Initiative to address transnational threat landscape
Industrial Cyber •- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
Equifax feels the heat in Washington for breach
The Hill •- Cyber Policy
- Cybersecurity
Cyber CEOs urge NIST Framework be made a part of NAFTA talks
CyberScoop •- Cyber Policy
- Cybersecurity
- Government
A new approach to federal cybersecurity, 2 years after the OPM breach
Federal News Radio •- Cyber Policy
- Government
Senators want answers on risk of nuclear power plant hacks
CNET •- Cyber Breaches
- Cyber Policy
- Energy
- Government
Cyber-Security Executive Order Implementation Deadlines Near
eWEEK •- Cyber Policy
- Government
One Year Out, Companies Seek Trust in U.S. Cyberthreat Sharing Program
Bloomberg BNA •- Cyber Policy
- Government
Apple sends out iPhone spyware warnings in 92 countries: What you need to know
The National •Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Two zero-days fixed in Microsoft's Patch Tuesday update
Computing •Speaking about this month's Patch Tuesday, senior staff research engineer Satnam Narang told Computing that the update is a reminder that flaws in Secure Boot persist and we could see more malicious activity related to Secure Boot in the future.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable
Channel Biz •In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region
- Business
- Cybersecurity
- Vulnerability Management
Cloud security: an identity problem - Security Insights
Security Insights •Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.
- Cyber Breaches
- Cyber Exposure Live
- Cyber Policy
- Cybersecurity
- Products
- Vulnerability Management
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention
Global Security Mag •In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.
- Cyber Breaches
- Cybersecurity
- Products
- Vulnerability Management
TikTok advertisements have pushed frauds about apps, diet tablets, various other items, record says
Entertainment Overdose •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Microsoft Patches 120 CVEs Including Two Zero Days
InfoSecurity •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
96% of UK businesses experienced at least one major cyber attack over past year
IT Pro •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
96% of UK Businesses Suffered a Damaging Cyber Attack in the Last Year
Computer Business Review •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Surveys / Research Data
- Vulnerability Management
Almost Half of Businesses Hit By COVID-Related “Business Impacting Cyber-Attack” in 2020
InfoSecurity •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Twitter accounts hacked to promote ‘CryptoForHealth’ Covid-19 scam
Information Age •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Inspirational Woman: Ciara Campbell | Senior Security Engineer, Tenable
We Are Tech Women •- Cybersecurity
- Vulnerability Management
Six défis de l'entreprise connectée selon le risk management
Les Echos •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Microsoft silent patches called “a grossly irresponsible policy”
IT Pro •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Patch Tuesday dogged by concerns over Microsoft vulnerability response
Computer Weekly •- Cybersecurity
- Vulnerability Management
Azure issues not adequately fixed for months, complain bug hunters
The Register •- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Lessons learned
Intersec •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Media contacts
Kit de medios
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.