Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

July 16, 2025

OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services

Tenable Research discovered a Remote Code Execution (RCE) vulnerability (now remediated) in Oracle Cloud Infrastructure (OCI) Code Editor. We demonstrated how an attacker could silently 1-click hijack a victim’s Cloud Shell environment and potentially pivot across OCI services. The vulnerability also affected Code Editor’s integrated services such as Resource Manager, Functions and Data Science.

June 29, 2023

Sécurité OT dans le secteur maritime : eaux troubles ou navigation tranquille ?

Le secteur maritime n'échappe pas à la vague de changements liés à la cyber-sécurité. Les navires interconnectés et les nouvelles technologies qui permettent au monde du transport maritime de devenir plus efficace introduisent également un cyber-risque. Here's what you need to know about the challenges and risks these floating cities face —...


June 28, 2023

How Exposure Management Can Make Pen Testing More Effective

Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....


June 27, 2023

Réduire concrètement les risques dans la chaîne de production

La cyber-sécurité pour le secteur industriel fait beaucoup de bruit, mais par quoi faut-il commencer ? Commençons tout simplement par les motivations des attaquants et ce qu'il faut faire pour les arrêter. Il s'agit avant tout de réduire le risque et de faire en sorte que les mesures que vous prenez portent leurs fruits. Read on to learn mor...


June 26, 2023

CVSSv4 is Coming: What Security Pros Need To Know

The latest revision of the industry standard for ranking vulnerabilities has some changes that practitioners will find useful. Here, we'll discuss them, as well as Tenable' plans to implement the scoring system in its products....


June 26, 2023

Tenable Cyber Watch : Verizon DBIR Warns About BEC and Ransomware, Cloud Security Tops CISOs’ Concerns, and more

This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’ coun...


June 23, 2023

CVE-2023-33299: Critical Remote Code Execution Vulnerability in FortiNAC

Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC...


June 23, 2023

Cybersecurity Snapshot: As Feds Hunt CL0P Gang, Check Out Tips on Ransomware Response, Secure Cloud Management and Cloud App Data Privacy

Learn all about the U.S. government’s reward for CL0P ransomware leads. Plus, check out ransomware incident response recommendations. Also, review concrete guidance on cloud system administration and on designing cloud apps with privacy by default. And much more!...


June 21, 2023

Shared Responsibility Model in the Cloud

CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture....


June 19, 2023

Tenable Cyber Watch: U.S. Government Updates Ransomware Guide, Lineaje Study Reveals Supply Chain Risks in OSS, and more

This week’s edition of the Tenable Cyber Watch unpacks the most recent updates to the U.S. government’s #StopRansomware Guide and addresses the steps organizations can take to boost digital trust. Also covered: why companies must be careful when using open source software. ...


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >