간격에 주의: 2022년에 공개된 취약성 자세히 알아보
This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable…
간격에 주의: 2022년의 주목할만한 8개 CVE 자세히 알아보기
This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss…
보안 리더가 보안 제품 수명 종료에 대해 알아야할 사항: Tenable이 시장을 선도하는 방식
Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers.
Tenable 2022 위협 환경 보고서: 알려진 취약성을 처리하여 위험 노출을 감소
Tenable’s annual analysis of the security and threat landscape offers guidance to help security professionals navigate the expanding attack surface.
모든 것을 수정할 수는 없습니다: 취약성 수정에 대해 위험 정보에 기반한 접근 방식을 사용하는 방법
Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help.
Patch Tuesday’s Impact on Cybersecurity Over the Years
Dive into the history of Patch Tuesday and learn how it continues to influence the ways security teams manage patches.
메타버스가 공격 표면에 포함되면 무슨 일이 발생합니까?
Tenable polled 1,500 cybersecurity, IT and DevOps professionals about their top concerns in the nascent virtual reality worlds of the metaverse. Here's what we found out.
NETGEAR Router Misconfiguration Opens The Door For Remote Attacks
Tenable Research has discovered a configuration issue impacting NETGEAR Nighthawk WiFi6 Routers commonly used in small offices and large homes. Organizations need to manually apply firmware updates.
Cloud Security Basics: Protecting Your Web Applications
While cloud computing providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure offer robust and scalable services, securing your cloud environment brings its own unique challenges. You can reduce risk by addressing these eight common cloud security…
Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021
International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. We identified vulnerabilities associated with these strains.
랜섬웨어 에코시스템: 부와 명성 추구
The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune.
뻔뻔하고 정교하지 않고 비논리적: LAPSUS$ Extortion Group 이해하기
Having gained the industry’s attention in the first months of 2022, the LAPSUS$ extortion group has largely gone quiet. What can we learn from this extortion group’s story and tactics?