Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

August 28, 2024

AA24-241A : Joint Cybersecurity Advisory on Iran-based Cyber Actors Targeting US Organizations

A joint Cybersecurity Advisory highlights Iran-based cyber actor ransomware activity targeting U.S. organizations. Cet avis inclut des CVE exploitées, ainsi que des techniques, des tactiques et des procédures utilisées par les attaquants.


August 28, 2024

The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy

DSPM solutions provide a comprehensive, up-to-date view into cloud-based data and risk. Une solution CNAPP et DSPM intégrée permet d'élever cette analyse pour dévoiler les combinaisons toxiques et les failles de sécurité dans les environnements cloud.


August 27, 2024

Sécuriser votre surface d'attaque en expansion grâce à la gestion des risques de sécurité

Le cloud, l'intelligence artificielle (IA), l'apprentissage automatique et bien d'autres innovations technologiques révolutionnent l'environnement de travail moderne. De nouveaux assets et services offrent davantage de flexibilité, un potentiel de croissance et un accès à davantage de ressources. However, they also introduce new security risks…


August 27, 2024

$200 Million Cybersecurity Funding Available for K-12 Schools and Libraries through FCC Cybersecurity Pilot Program

Empowering K-12 schools and libraries to strengthen their cybersecurity posture with new funding opportunities and best practices.


August 26, 2024

CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It?

Conventional wisdom suggests the keys to protect critical infrastructure against cyberattacks are network segmentation and OT security. But continued breaches imply those methods alone fall short. In fact, a CISA probe of 121 critical infrastructure networks found that their weakest link is…


August 23, 2024

Cybersecurity Snapshot: Guide Unpacks Event-Logging Best Practices, as FAA Proposes Stronger Cyber Rules for Airplanes

Looking to sharpen your team’s event logging and threat detection? A new guide offers plenty of best practices. Plus, the FAA wants airplanes to be more resilient to cyberattacks. Meanwhile, check out the critical vulnerabilities Tenable discovered in two Microsoft AI products. And get the latest…


August 20, 2024

SSRFing the Web with the Help of Copilot Studio

Tenable Research discovered a critical information-disclosure vulnerability in Microsoft’s Copilot Studio via a server-side request forgery (SSRF), which allowed researchers access to potentially sensitive information regarding service internals with potential cross-tenant impact.


By  Evan Grant
August 16, 2024

Cybersecurity Snapshot: First Quantum-resistant Algorithms Ready for Use, While New AI Risks’ Database Is Unveiled

NIST has released the first encryption algorithms that can protect data against quantum attacks. Plus, MIT launched a new database of AI risks. Meanwhile, the CSA published a paper outlining the unique risks involved in building systems that use LLMs. And get the latest on Q2’s most prevalent…


August 14, 2024

CVE-2024-7593: Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability

Ivanti released a patch for a critical severity authentication bypass vulnerability and a warning that exploit code is publicly available


August 13, 2024

Microsoft’s August 2024 Patch Tuesday Addresses 88 CVEs

Microsoft addresses 88 CVEs with seven critical vulnerabilities and 10 zero-day vulnerabilities, six of which were exploited in the wild.


August 13, 2024

Compromising Microsoft's AI Healthcare Chatbot Service

Tenable Research discovered multiple privilege-escalation issues in the Azure Health Bot Service via a server-side request forgery (SSRF), which allowed researchers access to cross-tenant resources.


August 9, 2024

Cybersecurity Snapshot: New Report Ranks Top Cloud Threats, while CISA Guide Helps Assess Security of Software Products

The Cloud Security Alliance has released its list of top cloud threats for 2024. Plus, CISA and the FBI published a guide for determining if a software product was built ‘secure by design.’ Meanwhile, find out how AI can transform offensive security. And get the latest on the Royal ransomware gang,…


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.