공격 경로 분석에 전문가가 아니십니까? Tenable ExposureAI가 선제적 보안을 달성하도록 지원합니다
With attacks becoming more sophisticated, security teams must spend more time analyzing different entry points into the organization, as well as numerous tactics, techniques and procedures. Find out how Tenable ExposureAI helps you overcome these challenges and enhances your efficiency and productiv...
사이버 보안 스냅샷: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto
Cyber agencies from multiple countries published a joint guide on using artificial intelligence safely. Meanwhile, CERT’s director says AI is the top skill for CISOs to have in 2024. Plus, the UK’s NCSC forecasts how AI will supercharge cyberattacks. And a global survey shows cyber pros weighing pro...
미국 국방부의 OT 시스템에 사이버 보호를 강화
Operational technology plays a major role in many aspects of the U.S. Department of Defense — including in military operations, in the infrastructure on bases and throughout the supply chain. Strengthening the cyber defenses of these systems is imperative. Here’s what you need to know. ...
CVE-2024-0204: Fortra GoAnywhere MFT 인증 우회 취약성
Proof-of-concept exploit details are available for a newly disclosed critical vulnerability in Fortra GoAnywhere Managed File Transfer (MFT), a product historically targeted by ransomware...
CVE-2023-22527: Atlassian Confluence Data Center 및 Server 템플릿 인젝션이 널리 악용됨
In the wild exploitation has begun for a recently disclosed, critical severity flaw in Atlassian Confluence Data Center and Server...
클라우드 보안 전략 레벨업
Learn how to better your cloud security program with these ten security resolutions. ...
사이버 보안 스냅샷: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response
Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. Plus, the challenges stressing out CISOs are also opening new doors for them. In addition, the latest on the Androxgh0st malware. A...
더 나은 이상 탐지 및 인시던트 대응을 위해 내부 로그를 활용
Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks....
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....
191개 CVE를 다루는 Oracle January 2024 중요 패치 업데이트
Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates....
CVE-2023-6548, CVE-2023-6549: Citrix NetScaler ADC 및 NetScaler Gateway에서 제로데이 취약성이 악용됨
Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws....
업계 전망: 2024년 주목할 필요가 있는 5개 주요 클라우드 보안 트렌드
생성형 AI가 조직의 사이버 보안 역량을 강화할 것이라는 사실에는 의심의 여지가 없습니다. 하지만, 먼저 탄탄한 사이버 보안 원칙을 적용하지 않는다면 사이버 보안 부서는 생성형 AI로부터 이점을 거의 얻지 못할 것입니다. In this blog, we explain the top cloud security trends that organizations must track – an...