Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

구독

Microsoft’s August 2024 Patch Tuesday Addresses 88 CVEs

August 13, 2024

Microsoft addresses 88 CVEs with seven critical vulnerabilities and 10 zero-day vulnerabilities, six of which were exploited in the wild.

Compromising Microsoft's AI Healthcare Chatbot Service

August 13, 2024

Tenable Research discovered multiple privilege-escalation issues in the Azure Health Bot Service via a server-side request forgery (SSRF), which allowed researchers access to cross-tenant resources.

사이버 보안 스냅샷: New Report Ranks Top Cloud Threats, while CISA Guide Helps Assess Security of Software Products

August 9, 2024

The Cloud Security Alliance has released its list of top cloud threats for 2024. Plus, CISA and the FBI published a guide for determining if a software product was built ‘secure by design.’ Meanwhile, find out how AI can transform offensive security. And get the latest on the Royal ransomware gang, the CIS Benchmarks and TikTok’s legal troubles!

CVE-2024-20419: Cisco Smart Software Manager On-Prem Password Change Vulnerability

August 9, 2024

Critical vulnerability in Cisco Smart Software Manager On-Prem exposes systems to unauthorized password changes, exploit code now available.BackgroundOn July 17, 2024, Cisco published an advisory for ...

Detecting Risky Third-party Drivers on Windows Assets

August 7, 2024

Kernel-mode drivers are critical yet risky components of the Windows operating system. Learn about their functionality, the dangers they pose, and how Tenable's new plugins can help identify and mitigate vulnerabilities using community-driven resources like LOLDrivers.

Tenable 리서치

Securing the AI Attack Surface: Separating the Unknown from the Well Understood

August 7, 2024

There's a lot of confusion and unknowns regarding AI application risks, and a lot of vendors are trying to offer solutions to problems that aren't clearly defined. In this blog we explain why a smart approach is to start by focusing on basic, foundational cyber hygiene, adopt well-established best practices and enforce common-sense usage policies.

Do You Think You Have No AI Exposures? Think Again

August 6, 2024

As AI usage becomes more prevalent in organizations globally, security teams must get full visibility into these applications. Building a comprehensive inventory of AI applications in your environment is a first step. Read on to learn what we found about AI application-usage in the real world when we analyzed anonymized telemetry data from scans using Tenable’s products.

Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach

August 6, 2024

As AI transforms industries, security remains critical. Discover the importance of a security-first approach in AI development, the risks of open-source tools, and how Tenable's solutions can help protect your systems.

Your Exposure Ends Here: Introducing the New Tenable Brand

August 5, 2024

At Tenable, our mission is to manage and reduce cyber risk, because cyber risk is business risk. Feedback from dozens of top CISOs is reflected in our latest brand evolution. Tenable is the exposure management company that helps customers know where their weaknesses lie, expose their risk and close the gaps. Welcome to Tenable. Your exposure ends here.

데이터에서 작업으로 전환: 인텔리전스 기반 취약성 관리

August 5, 2024

컨텍스트에 따라서 취약성의 우선 순위를 지정하는 것은 항상 취약성 관리 팀에게 도전 관제였으며 게시된 CVE의 수가 계속 증가하고 있으므로 이 작업은 더 쉬워지지 않을 것입니다. 이런 상황을 해결하기 위해 많은 엔터프라이즈에서는 다양한 인텔리전스 데이터 및 도구를 사용하여 환경을 보호하기 위한 제품 및 서비스에 투자할 수 밖에 없습니다. 이 블로그에서는 Tenable Vulnerability Intelligence 및 Exposure Response가 데이터에 기반한 결정을 내리도록 지원하여 우선 순위 지정을 향상하고 프로그램을 운영 가능하도록 만드는 방식을 설명합니다.

사이버 보안 스냅샷: Data Breach Costs Rise, as Ransomware Attacks Fall, Reports Find

August 2, 2024

IBM’s latest “Cost of a Data Breach Report” finds these data-theft incidents getting more expensive. Plus, the IT-ISAC says that ransomware attacks fell in Q2 due to law-enforcement disruptions of ransomware groups. Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI system security. And Tenable’s headed to Black Hat – visit our booth! And much more!

Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization

July 31, 2024

As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구입하십시오.

100 자산

구독 옵션 선택:

지금 구입

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구입하십시오.

100 자산

구독 옵션 선택:

지금 구입