IDC 連續第 5 年在全球裝置弱點管理市場佔有率將 Tenable 評等為第一
The research firm’s latest report also provides market insights that security professionals can use to improve their vulnerability management strategy....
Pig Butchering Scam: From Tinder and TikTok to WhatsApp and Telegram, How Scammers Are Stealing Millions in a Long Con
In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This blog highlights the who and the how of Pig butchering scams, and details the Pig butchering playboo...
Pig Butchering Scam: How Bitcoin, Ethereum, Litecoin and Spot Gold (XAUUSD) Investments Are Used in Romance Scams to Steal Hundreds of Millions
This is the second part of a two-part series based on firsthand research into pig butchering scams from the end of 2022 into early 2024. In this post, we delve into the types of investment scams perpetrated by pig butchers to steal hundreds of millions of dollars from victims, including in the form ...
孩子們並不安全: Edulog 入口網站中的弱點暴露了幼稚園、小學和中學學生的所在位置資料
Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control....
利用身分驗證掃描發揮您弱點掃描的最高價值
Want to get a lot more value out of your vulnerability scans? Start doing authenticated scanning...
Navigating the Roadblocks: Overcoming People, Process, and Technology Challenges for Preventive Security in Japan
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your Japanese organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable....
ApatchMe - Authenticated Stored XSS Vulnerability in AWS and GCP Apache Airflow Services
Unpatched Apache Airflow instances used in Amazon Web Services (AWS) and Google Cloud Platform (GCP) allow an exploitable stored XSS through the task instance details page....
What’s Stopping Organisations in India from Practicing Preventive Cybersecurity?
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your Indian organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable....
How People, Process and Technology Challenges are Standing in the Way of Preventive Security in Australia
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your Australian organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable....
People, Process and Technology Challenges Stand in the Way of Preventive Security in Asia Pacific
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your APAC organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable....
How People, Process and Technology Challenges Are Hurting Cybersecurity Teams
In a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, we set out to understand the real-world challenges standing in the way of effective risk-reduction practices. Here’s what we learned. ...
Study: Tenable Offers Fastest, Broadest Coverage of CISA's KEV Catalog
Tenable ranked first in multiple vulnerability management categories, including the most comprehensive coverage and quickest detection of CISA's Known Exploited Vulnerabilities, according to a Miercom report commissioned by Tenable....