Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Identifying XML External Entity: How Tenable.io Web Application Scanning Can Help

June 20, 2022

XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help.

CVE-2022-27511, CVE-2022-27512: Patches for Two Citrix Application Delivery Management Vulnerabilities

June 17, 2022

Citrix patches a “nasty bug” in its Application Delivery Management solution that is difficult to exploit.

Cybersecurity Snapshot: 6 Things That Matter Right Now

June 17, 2022

Key vulnerabilities you can’t ignore. Best practices to improve operational technology (OT) cybersecurity. A reality check on shift left, DevSecOps and cloud security. Tackling the security skills gap. Healthcare data breaches. And much more!

Tenable Capture the Flag 2022: The Results Are In!

June 16, 2022

It’s time to crown the winners of this year’s Capture the Flag Event! This event presented a series of security-related challenges in a Jeopardy-style format. Challenges ranged in difficulty and to...

Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190)

June 14, 2022

Microsoft addresses 55 CVEs in its June 2022 Patch Tuesday release, including three critical flaws.

Microsoft Azure Synapse Pwnalytics

June 13, 2022

Since March 10, Tenable Research has attempted to work with Microsoft to address two serious flaws in the underlying infrastructure of Azure Synapse Analytics.

Everybody Does Good VM When S#*t Hits the Fan 

June 9, 2022

Ever notice how security teams operate more efficiently during a crisis? We need to take the same approach to security all the time. To help you get started, here are four best practices – and a new Tenable.io feature. 

AWS, Azure and GCP: The Ultimate IAM Comparison

June 8, 2022

AWS vs. Azure vs. GCP — how do these cloud providers compare when it comes to IAM? Read on to find out.

So Many CVEs, So Little Time: Zero In and ‘Zero Click’ into the Current Vulnerability Landscape

June 8, 2022

Among the thousands of vulnerabilities disclosed so far in 2022, we highlight five and explain why they matter.

Bringing External Attack Surface Management to the Masses with Bit Discovery

June 6, 2022

External Attack Surface Management (EASM) is an essential foundation of cybersecurity best practices. Soon, you’ll be able to take advantage of automated attack surface discovery in Tenable products.

CVE-2022-26134: Zero-Day Vulnerability in Atlassian Confluence Server and Data Center Exploited in the Wild

June 3, 2022

A critical vulnerability in Atlassian Confluence Server and Data Center has been exploited in the wild by multiple threat actors. Organizations should review and implement mitigation guidance until a patch becomes available.

How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens

June 1, 2022

A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants, fuel pipelines, water treatment plants and similar facilities?

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.