Blogs Tenable
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find

Identifying Web Cache Poisoning and Web Cache Deception: How Tenable Web App Scanning Can Help
Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some common attack paths are so challenging to mitigate and how Tenable Web App Scanning can help.
Cybersecurity Snapshot: CISA Shines Light on Cloud Security and on Hybrid IAM Systems’ Integration
Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against Microsoft. And don’t miss the latest CIS Benchmarks. Et bien plus encore !
CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability
Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.
Introducing Tenable AI Assistant: Your Generative AI Analyst To Achieve Proactive Security
Context is critical when it comes to analyzing and prioritizing your exposures. Learn how Tenable AI Assistant, your new Gen AI-based security analyst, can help you answer specific questions, interpret exposure findings and respond to security issues faster than ever.
Microsoft’s March 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-21407)
Microsoft addresses 59 CVEs in its March 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.
What’s in Store This Year for Tenable Partners? A Lot of Growth, Including 25,000 Trees!
Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our partners.
Comment sécuriser tous vos assets IT, OT et IoT avec une plateforme de gestion de l'exposition : l'importance d'une priorisation contextualisée
Découvrez comment la priorisation contextuelle de l'exposition transforme la sécurité OT/IoT. Les entreprises peuvent désormais appliquer une prévention des failles proactive et non plus simplement réactive.
Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023
More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And…
CVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in JetBrains TeamCity
Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution.