Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

January 20, 2026

Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk

Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to ca...

March 24, 2025

What it Takes to Start the Exposure Management Journey

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to make the shift from vulnerability management to exposure management. In this blog, Tenable Senior Staff Information Security Engineer Arnie Cabral, who is leading the company's internal…


March 21, 2025

사이버 보안 스냅샷: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Check out key findings and insights from the “Tenable Cloud AI Risk Report 2025.” Plus, get fresh guidance on how to transition to quantum-resistant cryptography. In addition, find out how AI is radically transforming cyber crime. And get the latest on open source software security; cyber scams;…


March 20, 2025

적합한 클라우드 보안 공급자를 선택: 클라우드 보안 유지에 대해 타협할 수 없는 5개 사항

Protecting your cloud environment for the long term involves choosing a security partner whose priorities align with your needs. Here's what you need to know.


March 17, 2025

What Is Exposure Management and Why Does It Matter?

매주 월요일 Tenable 위험 노출 관리 아카데미에서는 취약성 관리에서 위험 노출 관리로 전환하기 위해 필요한 실용적이고 실제 환경에 사용할 수 있는 참조 자료를 제공합니다. In our first blog in this new series, we get you started with an overview of the differences between the two and explore how cyber…


March 14, 2025

사이버 보안 스냅샷: Medusa Ransomware Impacting Critical Infrastructure, CISA Warns, While NIST Selects New Quantum-Resistant Algorithm

Check out how to protect your org against the Medusa ransomware gang. Plus, another cryptographic algorithm designed to resist quantum attacks will be standardized. Meanwhile, Tenable did a deep dive on DeepSeek’s malware-creation capabilities. And get the latest on vulnerability prioritization;…


March 13, 2025

DeepSeek Deep Dive: Creating Malware, Including Keyloggers and Ransomware

Tenable Research examines DeepSeek R1 and its capability to develop malware, such as a keylogger and ransomware. We found it provides a useful starting point, but requires additional prompting and debugging.


March 11, 2025

Microsoft의 March 2025 Patch Tuesday에서 56개 CVE를 해결(CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)

Microsoft addresses 56 CVEs, including seven zero-day flaws, with six of those being exploited in the wild.


March 7, 2025

사이버 보안 스냅샷: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure programs. And get the latest on cyber scams; zero-day…


March 4, 2025

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited

Broadcom published an advisory for three flaws in several VMware products that were exploited in the wild as zero-days. Organizations are advised to apply the available patches.


도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

× 영업 팀에게 문의