Securing Critical Infrastructure: What We've Learned from Recent Incidents
Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure —from Phone Phreaking to recent ransomware.
Microsoft’s July 2022 Patch Tuesday Addresses 84 CVEs (CVE-2022-22047)
Microsoft addresses 84 CVEs in its July 2022 Patch Tuesday release, including four critical flaws and one zero day that has been exploited in the wild.
Présentation de Nessus Expert, conçu désormais pour la surface d'attaque externe
Depuis longtemps, Nessus s'est distingué comme le leader incontesté de l'évaluation des vulnérabilités. Avec l'arrivée de Nessus Expert, vous pouvez désormais vous protéger contre les cybermenaces, nouvelles et émergentes, de votre infrastructure cloud et comprendre ce qui se passe vraiment sur votre surface d'attaque externe.
Cloud and Data Security for Financial Services
Financial service organizations are adopting the cloud at a rapid pace. A robust solution for compliance and cloud security will ensure they enjoy all the benefits.
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending July 1 | Cybersecurity budgeting priorities. All you ever wanted to know about ransomware. CISOs weigh best-of-breed vs. platforms. The epidemic of identity-related breaches. And much more!
CVE-2022-28219 : Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus
New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month.
OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology
The latest research from Forescout’s Vedere Labs explores the state of risk management in operational technology through the lens of 56 insecure-by-design vulnerabilities.
Comprendre l'écosystème des ransomwares : des verrouilleurs d'écran aux entreprises criminelles multimillionnaires
Les ransomwares représentent une cyber-menace en constante évolution, et c'est par le biais de cette évolution qu'ils ont non seulement réussi à survivre, mais bien à prospérer.
Identifying XML External Entity: How Tenable.io Web Application Scanning Can Help
XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help.
CVE-2022-27511, CVE-2022-27512 :Patches for Two Citrix Application Delivery Management Vulnerabilities
Citrix patches a “nasty bug” in its Application Delivery Management solution that is difficult to exploit.
Cybersecurity Snapshot: 6 Things That Matter Right Now
Key vulnerabilities you can’t ignore. Best practices to improve operational technology (OT) cybersecurity. A reality check on shift left, DevSecOps and cloud security. Tackling the security skills gap. Healthcare data breaches. And much more!
Tenable Capture the Flag 2022: The Results Are In!
It’s time to crown the winners of this year’s Capture the Flag Event! This event presented a series of security-related challenges in a Jeopardy-style format. Challenges ranged in difficulty and topics including Web App, Reverse Engineering, Crypto, Stego, OSINT, Forensics, Code and more. …