Tenable 部落格
CVE-2026-20127: Cisco Catalyst SD-WAN Controller/Manager Zero-Day Authentication Bypass Vulnerability Exploited in the Wild
Tenable 網路觀察:Study Finds Many CISOs Are Unqualified to Serve on Boards, How Cybersecurity Boosts Business, and more
This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards.
網路安全概要: ChatGPT-like Tools Will Boost Developers’ Speed – and Amplify Cyber Risk
Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? And much more!
An Unexpected Implication of Lambda Privileges
Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance.
Tenable 網路觀察:聯邦調查局提供 1,000 萬美元獎金給提供 CL0P 資訊的人員、勒索軟體事端應變的最佳做法等等
This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure…
網路安全概要: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill
Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!
The Default Toxic Combination of GCP Compute Engine Instances
By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix.
OT 航運安全:前方是波濤洶湧、抑或是一帆風順?
海運業的網路安全正在經歷重大變動。互相連接的船舶與新技術提高了海運業的效率,同時也增加了網路風險。Here's what you need to know about the challenges and risks these floating cities face …
How Exposure Management Can Make Pen Testing More Effective
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
降低廠房風險的務實方法
在製造業工作場所中有許多網路安全雜訊,您該從何著手?讓我們化繁為簡,先瞭解攻擊者行動背後的原因、以及您可以怎麼做來阻止他們。重點就在於降低風險,以及讓您付出的心力發揮最佳成效。 Read on to learn…