Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

August 13, 2024

Microsoft’s August 2024 Patch Tuesday Addresses 88 CVEs

Microsoft addresses 88 CVEs with seven critical vulnerabilities and 10 zero-day vulnerabilities, six of which were exploited in the wild.


August 13, 2024

Compromising Microsoft's AI Healthcare Chatbot Service

Tenable Research discovered multiple privilege-escalation issues in the Azure Health Bot Service via a server-side request forgery (SSRF), which allowed researchers access to cross-tenant resources.


August 9, 2024

網路安全概要: New Report Ranks Top Cloud Threats, while CISA Guide Helps Assess Security of Software Products

The Cloud Security Alliance has released its list of top cloud threats for 2024. Plus, CISA and the FBI published a guide for determining if a software product was built ‘secure by design.’ Meanwhile, find out how AI can transform offensive security. And get the latest on the Royal ransomware gang,…


August 9, 2024

CVE-2024-20419: Cisco Smart Software Manager On-Prem Password Change Vulnerability

Critical vulnerability in Cisco Smart Software Manager On-Prem exposes systems to unauthorized password changes, exploit code now available.BackgroundOn July 17, 2024, Cisco published an advisory for a critical vulnerability in Cisco’s Smart Software Manager On-Prem (SSM On-Prem)…


August 7, 2024

Detecting Risky Third-party Drivers on Windows Assets

Kernel-mode drivers are critical yet risky components of the Windows operating system. Learn about their functionality, the dangers they pose, and how Tenable's new plugins can help identify and mitigate vulnerabilities using community-driven resources like LOLDrivers.


August 7, 2024

Securing the AI Attack Surface: Separating the Unknown from the Well Understood

There's a lot of confusion and unknowns regarding AI application risks, and a lot of vendors are trying to offer solutions to problems that aren't clearly defined. In this blog we explain why a smart approach is to start by focusing on basic, foundational cyber hygiene, adopt well-established best…


August 6, 2024

Do You Think You Have No AI Exposures? Think Again

As AI usage becomes more prevalent in organizations globally, security teams must get full visibility into these applications. Building a comprehensive inventory of AI applications in your environment is a first step. Read on to learn what we found about AI application-usage in the real world when…


August 6, 2024

Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach

As AI transforms industries, security remains critical. Discover the importance of a security-first approach in AI development, the risks of open-source tools, and how Tenable's solutions can help protect your systems.


August 5, 2024

Your Exposure Ends Here: Introducing the New Tenable Brand

At Tenable, our mission is to manage and reduce cyber risk, because cyber risk is business risk. Feedback from dozens of top CISOs is reflected in our latest brand evolution. Tenable is the exposure management company that helps customers know where their weaknesses lie, expose their risk and close…


August 5, 2024

將資料轉化為行動:以情資推動的弱點管理

利用背景資訊排定弱點的優先順序一直以來都是弱點管理團隊的挑戰,而由於公佈的 CVE 數量持續增加,這項工作也變得更加困難。To remedy this, many enterprises are forced to invest in products and services to protect their environments with various…


August 2, 2024

網路安全概要: Data Breach Costs Rise, as Ransomware Attacks Fall, Reports Find

IBM’s latest “Cost of a Data Breach Report” finds these data-theft incidents getting more expensive. Plus, the IT-ISAC says that ransomware attacks fell in Q2 due to law-enforcement disruptions of ransomware groups. Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI system…


July 31, 2024

Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization

As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help.


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

Apache Log4j 缺陷讓第三方軟體成為目光焦點

取得詳細資訊 >

× 聯絡我們的銷售團隊