Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

July 22, 2024

How To Do a Security Audit of Pimcore Enterprise Platform

Our new research paper gives you a roadmap for using Pimcore's features while preserving security....


July 19, 2024

Tenable Customer Update about CrowdStrike Incident

Please read this important customer update about CrowdStrike's recent incident....


July 19, 2024

사이버 보안 스냅샷: CISA Breaks Into Agency, Outlines Weak Spots in Report, as Cloud Security Alliance Updates Cloud Sec Guidance

CISA’s red team acted like a nation-state attacker in its assessment of a federal agency’s cybersecurity. Plus, the Cloud Security Alliance has given its cloud security guidance a major revamping. Meanwhile, a Google report puts a spotlight on insecure credentials. And the latest on open source secu...


July 18, 2024

Tenable Announces Former Senior Administration Officials to Inaugural Public Sector Advisory Board

Rob Joyce and Mark Weatherford will help Tenable shape federal cyber and AI policy...


July 16, 2024

Oracle의 July 2024 중요 패치 업데이트로 175개 CVE 해결

Oracle addresses 175 CVEs in its third quarterly update of 2024 with 386 patches, including 26 critical updates....


July 12, 2024

사이버 보안 스냅샷: CISA Tells Tech Vendors To Squash Command Injection Bugs, as OpenSSF Calls on Developers To Boost Security Skills

Check out CISA’s call for weeding out preventable OS command injection vulnerabilities. Plus, the Linux Foundation and OpenSSF spotlight the lack of cybersecurity expertise among SW developers. Meanwhile, GenAI deployments have tech leaders worried about data privacy and data security. And get the l...


July 11, 2024

위험 기반 취약성 관리가 최근 IT 환경의 보안 포스처를 강화하는 방식

취약성 평가 및 취약성 관리는 비슷하게 생각되지만 다릅니다. 새로운 Enterprise Strategy Group 백서에서 설명하는 것처럼 이들의 차이점을 이해하고 임시 취약성 평가에서 지속적인 위험 기반 취약성 관리(RBVM)로 전환하는 것이 중요합니다. Read...


July 9, 2024

Microsoft’s July 2024 Patch Tuesday Addresses 138 CVEs (CVE-2024-38080, CVE-2024-38112)

Microsoft addresses 138 CVEs in its July 2024 Patch Tuesday release, with five critical vulnerabilities and three zero-day vulnerabilities, two of which were exploited in the wild....


July 5, 2024

regreSSHion 취약성이 클라우드 환경에 영향을 줄 수 있는 방식

With growing concern over the recently disclosed regreSSHion vulnerability, we’re explaining here what it is, why it’s so significant, what it could mean for your cloud environment and how Tenable Cloud Security can help....


July 5, 2024

사이버 보안 스냅샷: Malicious Versions of Cobalt Strike Taken Down, While Microsoft Notifies More Orgs About Midnight Blizzard Email Breach

Check out the results of a multinational operation against illegal instances of Cobalt Strike. Plus, more organizations are learning that Midnight Blizzard accessed their email exchanges with Microsoft. Meanwhile, Carnegie Mellon has a new report about how to fix and mitigate API vulnerabilities. An...


June 28, 2024

사이버 보안 스냅샷: Memory Bugs Pervasive in Open Source SW, While Car Dealership Chaos Persists After Ransomware Attack

Check out why memory vulnerabilities are widespread in open source projects. Plus, get the latest on the ransomware attack that’s disrupted car sales in North America. In addition, find out why a majority of organizations grew their cyber budgets this year. And learn how confidential data from U.S. ...


June 26, 2024

Tag, You’re IT! Tagging Your Way to Cloud Security Excellence

To manage your cloud resources effectively and securely, you need to consistently tag assets across all your cloud platforms. Here we explain tagging’s main benefits, as well as proven strategies and best practices for tagging success. ...


도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >