Blogs Tenable
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market
Tenable customers have spoken: Here’s what they’re saying about our products.
The Keys to Implementing Exposure Management
Tous les lundis, Tenable Exposure Management Academy vous donne des conseils pratiques et concrets pour passer de la gestion des vulnérabilités à la gestion de l'exposition. In this post, we look at the results of a survey taken during a recent Tenable webinar on hesitations around exposure management.
Cybersecurity Snapshot: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan
Check out the latest on attackers’ cyber siege of SharePoint servers. Plus, the White House releases plan to spur AI innovation. In addition, CISA alerts orgs about Interlock ransomware. And get the latest on Q2's top malware; ransomware trends; and credentialed scanning.
Adopter une approche plus ciblée : les améliorations apportées à Tenable VPR et ce qui le distingue des autres modèles de priorisation
Tenable a récemment apporté un certain nombre d'améliorations au classement VPR (Vulnerability Priority Rating), notamment une threat intelligence enrichie, des informations et des explications optimisées par l'IA, ainsi que des métadonnées contextuelles. Learn how the improved prioritization effectiveness of the enhanced VPR compares to other common…
Tackling Shadow AI in Cloud Workloads
As enterprise adoption of cloud AI systems balloons, protecting them has become a priority. Shadow AI – the unsanctioned use of AI apps – has emerged as a particularly critical threat. Here we outline two best practices that can help you combat shadow AI in your cloud workloads.
Forrester désigne Tenable comme l'un des leaders du marché dans le rapport « Unified Vulnerability Management Solutions Wave™, Q3 2025 »
« Tenable continue d'étendre ses offres de gestion des vulnérabilités à la gestion de l'exposition grâce à sa plateforme Tenable One », selon le rapport.
How Exposure Management Can Turn a Torrent of Data into Insight
Tous les lundis, Tenable Exposure Management Academy vous donne des conseils pratiques et concrets pour passer de la gestion des vulnérabilités à la gestion de l'exposition. In this post, we look at the results of a survey taken during a recent Tenable webinar on the greatest cybersecurity challenges.
CVE-2025-53770: Frequently Asked Questions About Zero-Day SharePoint Vulnerability Exploitation
Successful exploitation of CVE-2025-53770 could expose MachineKey configuration details from a vulnerable SharePoint Server, ultimately enabling unauthenticated remote code execution.
CVE-2025-54309: CrushFTP Zero-Day Vulnerability Exploited In The Wild
A critical zero-day flaw in CrushFTP that can grant attackers administrator access was discovered on July 18 and is under active exploitation.