Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

October 16, 2025

F5 BIG-IP Breach: 44 CVEs That Need Your Attention Now

Partnering with an EDR vendor after a nation-state has already stolen your source code isn’t innovation — it’s a gamble. You don’t build a fire extinguisher while the house is burning. You find every spark before it becomes the next inferno.Key takeaways:F5’s BIG-IP is used to secure everything…


October 16, 2025

Tenable Discovers Critical Vulnerabilities in SimpleHelp Tool: CVE-2025-36727 and CVE-2025-36728

Tenable Research found two flaws in SimpleHelp’s remote-support tool that can be chained together to gain remote code execution on clients' devices. SimpleHelp has patched them: CVE-2025-36728 in version 5.5.11 and CVE-2025-36727 in version 5.5.12.


October 15, 2025

Frequently Asked Questions About The August 2025 F5 Security Incident

Frequently asked questions about the August 2025 security incident at F5 and the release of multiple BIG-IP product patches.


October 15, 2025

The Human Cost of Cyber Risk: How Exposure Management Can Ease Security Burnout

The true cost of cyber risk is a human one. Siloed tools and disjointed operations aren’t just endangering your business, they’re also taking a real toll on your teams. It’s long past time to take the friction out of cybersecurity with a unified, proactive approach.


October 14, 2025

Microsoft’s October 2025 Patch Tuesday Addresses 167 CVEs (CVE-2025-24990, CVE-2025-59230)

Microsoft addresses 167 CVEs in its largest Patch Tuesday to date, including three zero-day vulnerabilities, two of which were exploited in the wild.


October 14, 2025

Relying on EDR for Exposure Management? Here’s What You Need to Know

Endpoint detection and response tools may serve you well when it comes to handling incident response. But, when used for exposure management, they can leave you blind to large portions of your attack surface.


October 10, 2025

Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find

Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.


October 8, 2025

إدارة التعرض للمخاطر خارج حدود نقطة النهاية

يمكن أن يؤدي الاعتماد على نهج يركز على نقطة النهاية في إدارة التعرّض للمخاطر إلى ترك نقاط عمياء لديك تزيد من مستوى المخاطر. لذلك كان لزامًا عليك أن ترى بيئتك كما يراها المهاجم.


October 7, 2025

لا تدع أمن السحابة لديك ينهار بسبب تسلل الصلاحيات

غالباً ما تكون فرق الأمن السحابي غير مدركة لأحد أكبر التهديدات التي تواجه البيئات السحابية: وهي شبكة من الهويات ذات الصلاحيات المفرطة التي تُنشئ مسارات للمهاجمين. اكتشف كيف يمكنك استعادة السيطرة على هوياتك السحابية من خلال أتمتة فرض مبدأ الامتيازات الأقل عبر بيئتك.


October 6, 2025

How Exposure Management Helped Three Companies Transform Their Cybersecurity Program

Part two of our Exposure Management Academy series on exposure management maturity explores how organizations like Drogaria Araujo, Tenable and Verizon have applied exposure management to strengthen their security postures.


October 5, 2025

CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities

Following reports the Cl0p ransomware group has been extorting Oracle E-Business Suite customers, Oracle released an advisory for a zero-day that was exploited in the wild.


October 3, 2025

Cybersecurity Snapshot: Cybersecurity Awareness Month Arrives To Find AI Security a Hot Mess, as New OT Security Guidelines Highlight Architecture Mapping

As we kick off Cybersecurity Awareness Month, AI security challenges take the spotlight. Meanwhile, new marching orders say OT security teams need a comprehensive view of their systems. And get the latest on post-quantum computing standards and on a fresh batch of CIS Benchmarks!


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

× الاتصال بفريق المبيعات