Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

March 10, 2026

Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)

Microsoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released.

March 10, 2026

LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities

Tenable Research revealed "LeakyLooker," a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have let attackers exfiltrate or modify data across Google services like BigQuery and Google Sheets. Google has since remediated all identified issues.


March 9, 2026

President Trump's Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally

President Trump's Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience.


March 9, 2026

Tenable Named a Challenger in the 2026 Gartner® Magic Quadrant™ for CPS Protection Platforms

Security is no longer a siloed effort. Find out how Tenable integrates mature industrial security capabilities into an enterprise-ready approach for unified exposure management.


March 5, 2026

Strengthening California’s Cyber Defenses: Apply Now for FFY 2024 SLCGP Grants

Cal OES offers up to $250,000 to help California’s state, local, and tribal agencies strengthen their digital infrastructure against evolving cyber threats. Organizations must submit their applications by March 13, 2026.


March 3, 2026

Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations

Following the joint military operation known as Operation Epic Fury, the Tenable Research Special Operations (RSO) team is providing an update regarding potential cyber counteroffensive operations conducted by Iran-linked threat actors.


February 25, 2026

CVE-2026-20127: Cisco Catalyst SD-WAN Controller/Manager Zero-Day Authentication Bypass Vulnerability Exploited in the Wild

Exploitation of a maximum severity authentication bypass zero-day vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager has been reported. Immediate patching is recommended to thwart ongoing attacks.


February 24, 2026

New Malicious npm Package "ambar-src" Targets Developers with Open Source Malware

Tenable Research investigated a malicious npm package with around 50,000 downloads in the public registry. We observed various detection-evasion techniques and saw it deploy multiple powerful open-source malware variants.


February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.


February 19, 2026

Le piège de la vélocité du cloud et de l'IA : pourquoi la gouvernance est à la traîne de l'innovation

L'adoption de l'IA dépasse la gouvernance cyber traditionnelle. Le « Rapport Tenable 2026 sur les risques de sécurité liés au cloud et à l'IA » révèle comment les identités surprivilégiées et les dépendances non surveillées de la chaîne d'approvisionnement exposent les entreprises. Vous y trouverez 10 tactiques infaillibles pour bloquer vos chemins d'attaque les plus critiques.


Des actualités utiles sur la cybersécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.