Facebook Google Plus Twitter LinkedIn YouTube RSS Menú Buscar Recurso: BlogRecurso: Seminario webRecurso: InformeRecurso: Eventoicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Bienvenido a la sala de prensa de Tenable. Lea nuestros últimos comunicados y cobertura de medios, busque información de contactos globales y descargue nuestro kit de medios a continuación.

Get the latest Tenable news

Desde lanzamientos de productos innovadores pasando por informes de investigación de la industria hasta alianzas estratégicas, obtenga las últimas noticias y los comunicados oficiales de Tenable directamente en su bandeja de entrada.

Suscribirme

Comunicados de prensa

Columbia, Maryland

Tenable to Highlight Holistic Approach to Cyber Exposure at GISEC 2025

Columbia, Maryland

Tenable Wins AI Security Category in the 2025 Cybersecurity Excellence Awards

Columbia, Maryland

Tenable Appoints Steve Vintz and Mark Thurmond as Co-CEOs

Tokyo, Japan

Tenable Empowers erex with Continuous Cybersecurity Protection, Eliminating Costly Outsourcing

Columbia, Maryland

Tenable Achieves FedRAMP Authorization for Tenable One and Tenable Cloud Security

Columbia, Maryland

Tenable obtiene la calificación Elite 5-Star en la Guía del Programa de Socios CRN 2025


The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100

CRN

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

China's cyber intrusions took a sinister turn in 2024

The Register

"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.

 

Russian Hackers Target Mozilla, Windows in New Exploit Chain

Data Breach Today

Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset.

Satnam Narang, senior research engineer at Tenable, said the attack underscores both the persistence of threat actors and the increasing difficulty of breaching browser defenses.

"With the adoption of sandbox technology in modern browsers, threat actors need to do more than just exploit a browser vulnerability alone," Narang said in a statement. "By combining a browser-based exploit along with a privilege escalation flaw, the RomCom threat actor was able to bypass the Firefox sandbox."

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

Most widely exploited vulnerabilities in 2023 were zero days

TechTarget

While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.

Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.

Russia's APT29 Mimics AWS Domains to Steal Windows Credentials

Dark Reading

Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.

"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."

 

That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."

'Several' US government agencies attacked through MOVEit flaw, CISA

Computing

Tenable CEO, Amit Yoran, shares his thoughts on the Clop Ransomware gang's tactics with Computing Magazine.

Nathan Wenzler discusses how ChatGPT can be used by cybercriminals

Ticker Insight

Satnam Narang discusses insights from 2022 Threat Landscape Report

Ticker Insight
Satnam Narang discusses insights from 2022 Threat Landscape Report

Satnam Narang provides insights into old and new threats within the metaverse

Ticker Insight
Satnam Narang provides insights into old and new threats within the metaverse

Tenable One offers MSSPs unified cyber exposure visibility, Tenable says

IT Europa
Bernard Montel is interviewed by IT Europa to hear more about Tenable One and the benefit it brings to MSSPs.

Microsoft serves smorgasbord of six zero-days

Computer Weekly
Satnam Narang takes a closer look and this month's Patch Tuesday update, offering his analysis of the vulnerabilities addressed.

Marty Edwards discusses ransomware on critical infrastructure

TickerTV
Marty Edwards on TickerTV Australia comments on why critical infrastructure is an attractive target to cybercriminals.

‘The internet’s on fire’ as techs race to fix software flaw

Associated Press
Amit Yoran warns that Log4J is the the most significant vulnerability in a decade, and perhaps all time.

Cloud, Remote Work Will Change How IT Uses Vulnerability Scanners

Dark Reading
Tenable added Raspberry Pi support to Nessus v10.0 allowing penetration testers, security teams and students to deploy the power of Nessus anywhere.

Tenable commends Australia's Ransomware Action Plan

TickerTV Australia
Scott McKinnel, Country Manager for Tenable ANZ discusses why the Ransomware Action Plan is a step in the right direction but also urges the industry to do its part.

Nobelium hackers now attack a different part of the supply chain, Microsoft says

Industrial Cyber
Amit Yoran, Chairman and CEO at Tenable comments on the Nobelium attacks.

Adopting a Counter Ransomware Initiative to address transnational threat landscape

Industrial Cyber
Marty Edwards, vice president of OT Security at Tenable provides his view on the ‘Counter Ransomware Initiative’ facilitated by the US among over 30 countries and the European Union.

Equifax feels the heat in Washington for breach

The Hill
Amit Yoran talks with The Hill about the scope and impact of the Equifax data breach.

Cyber CEOs urge NIST Framework be made a part of NAFTA talks

CyberScoop
Amit Yoran speaks to CyberScoop about why the use of cybersecurity frameworks should be incorporated into NAFTA renegotiations.

A new approach to federal cybersecurity, 2 years after the OPM breach

Federal News Radio
In Federal News Radio, John Chirhart recommends taking a modern approach to federal cybersecurity.

Senators want answers on risk of nuclear power plant hacks

CNET
Amit Yoran tells CNET that better security common sense is needed to thwart successful attacks on critical infrastructure.

Cyber-Security Executive Order Implementation Deadlines Near

eWEEK
John Chirhart talks to eWEEK about the Cyber EO, explaining that it's helped agencies better prioritize their security efforts on areas such as critical infrastructure.

One Year Out, Companies Seek Trust in U.S. Cyberthreat Sharing Program

Bloomberg BNA
Amit Yoran tells Bloomberg BNA that companies must see a value proposition before joining the DHS cyberthreat sharing program.

Apple sends out iPhone spyware warnings in 92 countries: What you need to know

The National

Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.

Two zero-days fixed in Microsoft's Patch Tuesday update

Computing

Speaking about this month's Patch Tuesday, senior staff research engineer Satnam Narang told Computing that the update is a reminder that flaws in Secure Boot persist and we could see more malicious activity related to Secure Boot in the future.

“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable

Channel Biz

In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region

Cloud security: an identity problem - Security Insights

Security Insights

Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.

What Will The NIS2 Directive Mean For Smaller Organisations?

Cyber Security Intelligence

In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline

Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention

Global Security Mag

In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.

TikTok advertisements have pushed frauds about apps, diet tablets, various other items, record says

Entertainment Overdose
Satnam Narang's research reveals scammers are purchasing ads on TikTok to promote bogus products and services.

Microsoft Patches 120 CVEs Including Two Zero Days

InfoSecurity
Reviewing this month's Microsoft update, Satnam Narang offers his analysis of CVE-2020-1380.

96% of UK businesses experienced at least one major cyber attack over past year

IT Pro
Guy March explains that resellers have a role to play in elevating cybersecurity as a strategic business risk.

96% of UK Businesses Suffered a Damaging Cyber Attack in the Last Year

Computer Business Review
Findings of the Tenable sponsored Forrester Report, including commentary from Tenable Customer - Lafarge Holcim, advocating a layered approach to cybersecurity.

Almost Half of Businesses Hit By COVID-Related “Business Impacting Cyber-Attack” in 2020

InfoSecurity
Tenable sponsored Forrester report highlights increased cyberattacks using COVID themed activity.

Twitter accounts hacked to promote ‘CryptoForHealth’ Covid-19 scam

Information Age
Satnam Narang explains that the domain connection between the tweets indicates this is a coordinated attack.

Inspirational Woman: Ciara Campbell | Senior Security Engineer, Tenable

We Are Tech Women
Ciara Campbell interviewed as an inspirational woman in technology.

Six défis de l'entreprise connectée selon le risk management

Les Echos
Bernard Montel discusses the cyberthreats to modern infrastructure.

Microsoft silent patches called “a grossly irresponsible policy”

IT Pro
Amit Yoran points to Microsoft's repeated pattern of behaviour in response to vulnerability disclosures.

Patch Tuesday dogged by concerns over Microsoft vulnerability response

Computer Weekly
Claire Tills unpicks the latest Microsoft Patch Tuesday update.

Azure issues not adequately fixed for months, complain bug hunters

The Register
Amit Yoran calls out Microsoft's response to vulnerability disclosures.

Lessons learned

Intersec
Bernard Montel looks back at 2021: a year of turbulence in cyber risk – from lockdown to Log4Shell.

Media contacts

Relaciones públicas corporativas [email protected]
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Offleash
[email protected]
UK
Brands2Life
[email protected]
+44 (0)20 7592 1200
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Kit de medios

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets