Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

May 1, 2024

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution. ...


April 26, 2024

網路安全概要: 最新的 MITRE ATT&CK 更新提供了有關生成式 AI、身分、雲端和 CI/CD 的安全洞見

Check out what’s new in Version 15 of the MITRE ATT&CK knowledge base of adversary tactics, techniques and procedures. Plus, learn the latest details about the Change Healthcare breach, including the massive scope of the data exfiltration. In addition, why AI cyberthreats aren’t impacting CISOs’ bud...


April 25, 2024

CVE-2024-20353、CVE-2024-20359: 關於 ArcaneDoor 的常見問答集

Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances....


April 23, 2024

CVE-2024-4040:CrushFTP Virtual File System (VFS) 沙箱逸出弱點遭到刺探利用

A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible....


April 19, 2024

國防部內的操作技術:確保安全又高效的電網

In an evolving threat landscape, the DoD must make sure that its mission-critical operations don’t experience power outages....


April 19, 2024

網路安全概要: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. Plus, Stanford University offers a comprehensive review of AI trends. Meanwhile, a new open-source tool aims to simplify SBOM usage. And don’t miss the latest CIS Benchmarks updates. And much more!...


April 18, 2024

Tenable and Thales Collaborate to Provide Cyber Defense Simulations to Better Secure Operational Technology Environments

The heart of the Welsh Valleys is home to the Thales Ebbw Vale campus, a world-class facility jointly funded by the Welsh government as part of its regeneration program for the region. At the core of the facility is the Cyber Range, a simulation and virtualization platform for training, testing, exe...


April 17, 2024

Oracle 2024 年 4 月重大修補程式更新中解決了 239 個 CVE

Oracle addresses 239 CVEs in its second quarterly update of 2024 with 441 patches, including 38 critical updates....


April 16, 2024

利用 SLSA 強化 Nessus 軟體供應鏈

You know Tenable as a cybersecurity industry leader whose world-class exposure management products are trusted by our approximately 43,000 customers, including about 60% of the Fortune 500. But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cybe...


April 15, 2024

探索有關國防部生產線的 OT 安全挑戰

How operational technology can revolutionize logistics, supply chain management, and overall efficiency....


April 12, 2024

CVE-2024-3400:Palo Alto Networks PAN-OS GlobalProtect Gateway 中受到猖獗刺探利用的零時差弱點

A critical severity command injection vulnerability in Palo Alto Networks PAN-OS has been exploited in limited targeted attacks. While a fix is not yet available, patches are expected to be released on April 14 and mitigation steps are available....


April 12, 2024

網路安全概要: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Check out CISA’s urgent call for federal agencies to protect themselves from Midnight Blizzard’s breach of Microsoft corporate emails. Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. Meanwhile, SANS pinpoints the four trends CISOs absolutely must focus on this year. An...


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

Apache Log4j 缺陷讓第三方軟體成為目光焦點

取得詳細資訊 >