Le score EPSS s'avère performant pour prédire les exploits, comme l'indique l'étude de Cyentia et FIRST
Tenable sponsored research from Cyentia and FIRST, which finds that while vulnerability exploitation is highly variable, EPSS is getting stronger in its ability to predict exploitation. ...
ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions
Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs ...
How To Do a Security Audit of Pimcore Enterprise Platform
Our new research paper gives you a roadmap for using Pimcore's features while preserving security....
Comment la gestion des vulnérabilités basée sur le risque booste la posture de sécurité de votre environnement IT moderne
L'évaluation des vulnérabilités et la gestion des vulnérabilités ont l'air identiques, mais c'est faux. Comme l'explique un nouveau livre blanc émanant d'ESG (Enterprise Strategy Group), il est indispensable de comprendre les différences qui les caractérisent et de passer d'une série d'évaluations des vulnérabilités ad-hoc à une gestion des vulnérabilités continue et basée sur le risque (RBVM). Read...
These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)
Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if you’re affected, and if so, what you should do right away to protect your Azure environment from atta...
Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)
Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services....
L'étude Tenable Cloud Security révèle un chiffre impressionnant de 95 % des entreprises interrogées qui ont subi une violation liée au cloud sur une période de 18 mois
Il ressort clairement de l'étude Perspectives sur la sécurité du cloud en 2024 de Tenable qu'il est nécessaire de mettre en place une sécurité du cloud proactive et robuste. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud infrastruc...
FlowFixation: AWS Apache Airflow Service Takeover Vulnerability and Why Neglecting Guardrails Puts Major CSPs at Risk
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of m...
IDC classe Tenable n° 1 en termes de part de marché mondiale dans le domaine de la gestion des vulnérabilités des appareils pour la cinquième année consécutive
The research firm’s latest report also provides market insights that security professionals can use to improve their vulnerability management strategy....
Pig Butchering Scam: From Tinder and TikTok to WhatsApp and Telegram, How Scammers Are Stealing Millions in a Long Con
In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This blog highlights the who and the how of Pig butchering scams, and details the Pig butchering playboo...
Pig Butchering Scam: How Bitcoin, Ethereum, Litecoin and Spot Gold (XAUUSD) Investments Are Used in Romance Scams to Steal Hundreds of Millions
This is the second part of a two-part series based on firsthand research into pig butchering scams from the end of 2022 into early 2024. In this post, we delve into the types of investment scams perpetrated by pig butchers to steal hundreds of millions of dollars from victims, including in the form ...
The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data
Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control....