Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

June 17, 2025

GerriScary: Hacking the Supply Chain of Popular Google Products (ChromiumOS, Chromium, Bazel, Dart & More)

Tenable Cloud Research discovered a supply chain compromise vulnerability in Google's Gerrit code-collaboration platform which we dubbed GerriScary. GerriScary allowed unauthorized code submission to at least 18 Google projects including ChromiumOS (CVE-2025-1568), Chromium, Dart and Bazel, which are now remediated. Third-party organizations that use Gerrit may also be at risk from GerriScary.

July 19, 2024

Tenable Customer Update about CrowdStrike Incident

Please read this important customer update about CrowdStrike's recent incident....


July 19, 2024

Cybersecurity Snapshot: CISA Breaks Into Agency, Outlines Weak Spots in Report, as Cloud Security Alliance Updates Cloud Sec Guidance

CISA’s red team acted like a nation-state attacker in its assessment of a federal agency’s cybersecurity. Plus, the Cloud Security Alliance has given its cloud security guidance a major revamping. Meanwhile, a Google report puts a spotlight on insecure credentials. And the latest on open source secu...


July 18, 2024

Tenable Announces Former Senior Administration Officials to Inaugural Public Sector Advisory Board

Rob Joyce and Mark Weatherford will help Tenable shape federal cyber and AI policy...


July 16, 2024

Oracle July 2024 Critical Patch Update Addresses 175 CVEs

Oracle addresses 175 CVEs in its third quarterly update of 2024 with 386 patches, including 26 critical updates....


July 12, 2024

Cybersecurity Snapshot: CISA Tells Tech Vendors To Squash Command Injection Bugs, as OpenSSF Calls on Developers To Boost Security Skills

Check out CISA’s call for weeding out preventable OS command injection vulnerabilities. Plus, the Linux Foundation and OpenSSF spotlight the lack of cybersecurity expertise among SW developers. Meanwhile, GenAI deployments have tech leaders worried about data privacy and data security. And get the l...


July 11, 2024

Comment la gestion des vulnérabilités basée sur le risque booste la posture de sécurité de votre environnement IT moderne

L'évaluation des vulnérabilités et la gestion des vulnérabilités ont l'air identiques, mais c'est faux. Comme l'explique un nouveau livre blanc émanant d'ESG (Enterprise Strategy Group), il est indispensable de comprendre les différences qui les caractérisent et de passer d'une série d'évaluations des vulnérabilités ad-hoc à une gestion des vulnérabilités continue et basée sur le risque (RBVM). Read...


July 9, 2024

Microsoft’s July 2024 Patch Tuesday Addresses 138 CVEs (CVE-2024-38080, CVE-2024-38112)

Microsoft addresses 138 CVEs in its July 2024 Patch Tuesday release, with five critical vulnerabilities and three zero-day vulnerabilities, two of which were exploited in the wild....


July 5, 2024

How the regreSSHion Vulnerability Could Impact Your Cloud Environment

With growing concern over the recently disclosed regreSSHion vulnerability, we’re explaining here what it is, why it’s so significant, what it could mean for your cloud environment and how Tenable Cloud Security can help....


July 5, 2024

Cybersecurity Snapshot: Malicious Versions of Cobalt Strike Taken Down, While Microsoft Notifies More Orgs About Midnight Blizzard Email Breach

Check out the results of a multinational operation against illegal instances of Cobalt Strike. Plus, more organizations are learning that Midnight Blizzard accessed their email exchanges with Microsoft. Meanwhile, Carnegie Mellon has a new report about how to fix and mitigate API vulnerabilities. An...


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >