Blogs Tenable
Dynamic Objects in Active Directory: The Stealthy Threat
Le piège de la vélocité du cloud et de l'IA : pourquoi la gouvernance est à la traîne de l'innovation
L'adoption de l'IA dépasse la gouvernance cyber traditionnelle. Le « Rapport Tenable 2026 sur les risques de sécurité liés au cloud et à l'IA » révèle comment les identités surprivilégiées et les dépendances non surveillées de la chaîne d'approvisionnement exposent les entreprises. Vous y trouverez 10 tactiques infaillibles pour bloquer vos chemins d'attaque les plus critiques.
Gartner® désigne Tenable comme la nouvelle « entreprise à battre » (Company to Beat) en évaluation de l'exposition alimentée par l'IA dans un rapport de 2025
« La couverture des assets et de la surface d'attaque par Tenable, son application de l'IA et sa réputation en matière d'évaluation des vulnérabilités en font le leader en évaluation de l'exposition alimentée par l'IA », écrit Gartner dans son rapport « AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment ».
Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513)
Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday released, including six zero-day vulnerabilities that were exploited in the wild and three publicly disclosed CVEs.
What Anthropic’s Latest Model Reveals About the Future of Cybersecurity
AI can find vulnerabilities with unprecedented speed, but discovery alone doesn’t reduce cyber risk. We need exposure prioritization, contextual risk analysis, and AI-driven remediation to transform findings into security outcomes.
I pretended to be an AI agent on Moltbook so you don’t have to
I went undercover on Moltbook, the AI-only social network, masquerading as a bot. Instead of deep bot-to-bot conversations, I found spam, scams, and serious security risks.
2025 SLG cyber trends: 5 lessons to build a 2026 cyber roadmap
From school districts to state agencies, 2025 cyber incidents were a wake-up call about asset visibility. Discover five actionable lessons SLG leaders can use to close the cyber exposure gap and move from reactive threat detection and response to proactive exposure management.
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions.
From Clawdbot to Moltbot to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
Moltbot, the viral AI agent, is riddled with critical vulnerabilities, exposed control interfaces, and malicious extensions that put users' sensitive data at risk. Understand the immediate security practices you can implement to mitigate this enormous agentic AI security risk.
Frequently Asked Questions About Notepad++ Supply Chain Compromise
Threat actors compromised the update infrastructure for Notepad++, redirecting traffic to an attacker controlled site for targeted espionage purposes.