Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

July 15, 2025

Oracle July 2025 Critical Patch Update Addresses 165 CVEs

Oracle addresses 165 CVEs in its third quarterly update of 2025 with 309 patches, including nine critical updates.

June 17, 2024

How to Discover, Analyze and Respond to Threats Faster with Generative AI

Generative AI (GenAI) is being hailed as the most transformative innovation since the rise of the internet. For security, GenAI can revolutionize the field if applied correctly, especially when it comes to threat detection and response. It enhances efficiency and productivity by swiftly processing a...


June 14, 2024

Cybersecurity Snapshot: U.K. Cyber Agency Urges Software Vendors To Boost Product Security, While U.S. Gov’t Wants Info on Banks’ AI Use

Check out the NCSC’s call for software vendors to make their products more secure. Plus, why the Treasury Department is looking at how financial institutions are using AI. And the latest on the cybersecurity skills gap in the U.S. And much more!...


June 11, 2024

Microsoft’s June 2024 Patch Tuesday Addresses 49 CVEs

Microsoft addresses 49 CVEs in its June 2024 Patch Tuesday release with one rated as critical and no zero-day or publicly disclosed vulnerabilities. Our counts omitted two CVEs that were not issued by Microsoft, which include CVE-2023-50868 (issued by MITRE) and CVE-2024-29187 (issued by GitHub)....


June 11, 2024

Protection de charge de travail cloud (CWP) : le secret de Tenable Cloud Security pour réduire les risques liés à la sécurité du cloud

Plus de 80 % des intrusions impliquent des données stockées dans le cloud. Face à des attaquants qui souhaitent accéder à un maximum de données avec un minimum d'efforts, les équipes de sécurité qui n'ont pas recours à la protection des charges de travail cloud (CWP, Cloud Workload Protection) ne parviendront peut-être jamais à prendre une longueur d'avance. A single cloud breach is often the most straightforward way into these...


June 7, 2024

CVE-2024-4577: Proof of Concept Available for PHP-CGI Argument Injection Vulnerability

Researchers disclose a critical severity vulnerability affecting PHP installations and provide proof-of-concept exploit code, which could lead to remote code execution....


June 7, 2024

Cybersecurity Snapshot: NIST Program Assesses How AI Systems Will Behave in the Real World, While FBI Has Troves of Decryption Keys for LockBit Victims

Check out the new ARIA program from NIST, designed to evaluate if an AI system will be safe and fair once it’s launched. Plus, the FBI offers to help LockBit victims with thousands of decryption keys. In addition, Deloitte finds that boosting cybersecurity is key for generative AI deployment success...


June 6, 2024

Tenable Partners with CISA to Enhance Secure By Design Practices

When CISA called on the world’s leading software manufacturers to sign its Secure by Design pledge, Tenable answered promptly and enthusiastically, becoming part of the first wave of supporters of this landmark initiative. In this blog post, Tenable CSO, Head of Research and President of Public Sect...


June 5, 2024

Rockwell Automation: Disconnect OT Devices with Public-Facing Internet Access, Patch or Mitigate Logix, FactoryTalk CVEs

An advisory from Rockwell Automation reiterates the importance of disconnecting operational technology devices with public-facing internet access and patching and mitigating systems vulnerable to several flaws....


June 4, 2024

CVE-2024-4358, CVE-2024-1800: Exploit Code Available for Critical Exploit Chain in Progress Telerik Report Server

Researchers have released an exploit chain to achieve remote code execution on unpatched instances of Progress Telerik Report Server. Immediate patching is recommended....


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >