Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

January 20, 2026

Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk

Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to ca...

July 28, 2022

3 Types of Cyber Attackers: Which Organizations Do They Target?

Is an attacker interested in your organization? Probably. Deconstructing the PoV of cyberattackers is key to defending your turf.


July 28, 2022

The Ransomware Ecosystem: In Pursuit of Fame and Fortune

The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune.


juil. 22, 2022

NSTAC Aces Zero Trust Recommendations for Protecting Government Entities

Kudos to the National Security Telecommunications Advisory Committee for its report on boosting zero trust and ID management. As the Biden administration looks to implement its recommendations, a strong focus on vulnerability management would optimize opportunities for success.


juil. 20, 2022

Oracle July 2022 Critical Patch Update Addresses 188 CVEs

Oracle addresses 188 CVEs in its third quarterly update of 2022 with 349 patches, including 66 critical updates.


juil. 20, 2022

Impudent, peu sophistiqué et illogique : comprendre le groupe d'extorsion LAPSUS$

Après avoir attiré l'attention de tout le secteur pendant les premiers mois de 2022, le groupe de pirates informatiques LAPSUS$ fait profil bas. Que pouvons-nous apprendre de l'histoire et des tactiques de ce groupe d'extorsion ?


juil. 15, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending July 15 | Government cybersecurity efforts tripped by technical debt. Neglect SaaS security at your own risk. A ranking of the most dangerous software weaknesses. Lessons learned about critical infrastructure security. Et bien plus encore !


juil. 14, 2022

Securing Critical Infrastructure: What We've Learned from Recent Incidents

Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure —from Phone Phreaking to recent ransomware.


juil. 12, 2022

Microsoft’s July 2022 Patch Tuesday Addresses 84 CVEs (CVE-2022-22047)

Microsoft addresses 84 CVEs in its July 2022 Patch Tuesday release, including four critical flaws and one zero day that has been exploited in the wild.


juil. 12, 2022

Présentation de Nessus Expert, conçu désormais pour la surface d'attaque externe

Depuis longtemps, Nessus s'est distingué comme le leader incontesté de l'évaluation des vulnérabilités. Avec l'arrivée de Nessus Expert, vous pouvez désormais vous protéger contre les cybermenaces, nouvelles et émergentes, de votre infrastructure cloud et comprendre ce qui se passe vraiment sur votre surface d'attaque externe.


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

× Contactez notre équipe commerciale