Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

April 23, 2026

Five steps to become Mythos ready

AI is uncovering vulnerabilities at a scale that will overwhelm legacy defenses. Here is how to build a security organization that is Mythos ready.

April 1, 2026

Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069

A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during a three-hour window on March 31.


March 31, 2026

Supply chain attack on Axios npm package: Scope, impact, and remediations

The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft. Scan your environment now.


March 31, 2026

What’s new in Tenable Cloud Security: Custom policies, AWS ABAC, and research-driven protection

Stop the noise and scale your cloud security. Our latest updates introduce custom policy automation via Explorer, AWS ABAC support for true least privilege, and research-backed protection against critical vulnerabilities, all designed to slash MTTR without disrupting your DevOps workflows.


March 26, 2026

Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection

Tenable One's new Model Refusal Detection turns an LLM's refusal to execute a risky or suspicious prompt into a high-fidelity early warning signal. It helps you uncover and stop prompt injection attacks, insider threats, and other risky behaviors before they escalate into a breach.


March 25, 2026

Security for AI: A guide to managing the risks of vibe coding and AI in software development

Get a template for an AI coding acceptable use policy with security controls and a list of 25 security questions to ask software developers and “citizen developers” about their AI use. Mitigate the security risks of vibe coding and using AI in software development with Tenable One.


March 24, 2026

Tenable Hexa AI 소개: 위험 노출 관리를 위한 에이전트 AI

Tenable One - 위험 관리 노출 플랫폼의 에이전트 엔진인 Tenable Hexa AI를 소개합니다. Tenable Hexa AI가 어떻게 복잡한 보안 워크플로를 자동화하고 위험 노출 인텔리전스를 조율된 대응으로 전환하여 보안 팀이 사이버 위험을 실질적으로 줄일 수 있도록 지원하는지 알아보십시오.


March 23, 2026

The hidden cost of AI speed: Unmanaged cyber risk

AI isn’t just moving fast. It’s creating new attack paths. Cyber teams must now manage vulnerabilities – and their ramifications throughout their IT environments – in AI tools deployed without enough governance guardrails. The answer for securing this new attack surface? Unified exposure management.


March 20, 2026

CVE-2026-21992: Critical Out-of-Band Oracle Identity Manager and Oracle Web Services Manager Remote Code Execution Vulnerability

Oracle published an out-of-band security alert for a critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager, following in-the-wild exploitation of a related flaw in the same component in November 2025.


March 19, 2026

Bolster your defenses and close the code-to-cloud gap with Tenable and OX

Today, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenable and OX helps you close the code-to-cloud gap from development through runtime. By combining CNAPP with deep AppSec, this integration is…


도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.