Topics that are top of mind for the week ending July 1 | Cybersecurity budgeting priorities. All you ever wanted to know about ransomware. CISOs weigh best-of-breed vs. platforms. The epidemic of identity-related breaches. And much more!
CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit PlusJune 30, 2022
New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month.
The latest research from Forescout’s Vedere Labs explores the state of risk management in operational technology through the lens of 56 insecure-by-design vulnerabilities.
Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal EnterpriseJune 22, 2022
Ransomware is a constantly evolving cyberthreat, and it is through its evolution that ransomware has managed to not only survive, but thrive.
XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help.
CVE-2022-27511, CVE-2022-27512: Patches for Two Citrix Application Delivery Management VulnerabilitiesJune 17, 2022
Citrix patches a “nasty bug” in its Application Delivery Management solution that is difficult to exploit.
Key vulnerabilities you can’t ignore. Best practices to improve operational technology (OT) cybersecurity. A reality check on shift left, DevSecOps and cloud security. Tackling the security skills gap. Healthcare data breaches. And much more!
It’s time to crown the winners of this year’s Capture the Flag Event! This event presented a series of security-related challenges in a Jeopardy-style format. Challenges ranged in difficulty and to...
Microsoft addresses 55 CVEs in its June 2022 Patch Tuesday release, including three critical flaws.
Since March 10, Tenable Research has attempted to work with Microsoft to address two serious flaws in the underlying infrastructure of Azure Synapse Analytics.
Ever notice how security teams operate more efficiently during a crisis? We need to take the same approach to security all the time. To help you get started, here are four best practices – and a new Tenable.io feature.
Among the thousands of vulnerabilities disclosed so far in 2022, we highlight five and explain why they matter.