Tenable 블로그
Frequently Asked Questions About The August 2025 F5 Security Incident

The AI Security Dilemma: Navigating the High-Stakes World of Cloud AI
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.Artificial Intelligence is no longer on the horizon; it's here, and it's being built and deployed…
Tenable AI Exposure 소개: 추측을 멈추고 AI 공격을 보호하기 시작
현재 Tenable One에서 사용 가능한 Tenable AI Exposure는 팀에서 AI 플랫폼을 사용하는 방식과 이런 사용으로 인해 데이터, 사용 및 방어 기능을 위험에 빠뜨릴 수 있는 곳에 대한 가시성을 제공합니다.
CVE-2025-54135, CVE-2025-54136: Frequently Asked Questions About Vulnerabilities in Cursor IDE (CurXecute and MCPoison)
Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems.
Frequently Asked Questions About SonicWall Gen 7 Firewall Ransomware Activity
An increase in ransomware activity tied to SonicWall Gen 7 Firewalls has been observed, possibly linked to the exploitation of a zero-day vulnerability in its SSL VPN.
The White House AI Action Plan: A Critical Opportunity to Secure the Future
AI without built-in cybersecurity remains a liability. The AI Action Plan presents a pivotal opportunity to get this right by emphasizing a secure-by-design approach.
In Cybersecurity, We Have to Work Together
The future of cybersecurity depends on open, collaborative platforms that bring the industry's best solutions together.
How Exposure Management Moves Beyond Vulnerability Scans to A Unified View of Risk
매주 월요일 Tenable 위험 노출 관리 아카데미에서는 취약성 관리에서 위험 노출 관리로 전환하기 위해 필요한 실용적이고 실제 환경에 사용할 수 있는 참조 자료를 제공합니다. In this post, we look at the results of a survey taken during a recent Tenable webinar on the level of familiarity with exposure…
사이버 보안 스냅샷: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation;…
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight
Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats.