مدونة Tenable
Dynamic Objects in Active Directory: The Stealthy Threat
مصيدة السحابة وسرعة الذكاء الاصطناعي: لماذا تتخلف الحوكمة عن ركب الابتكار
اعتماد الذكاء الاصطناعي يفوق الحوكمة الإلكترونية التقليدية. يكشف "تقرير المخاطر الأمنية للحوسبة السحابية والذكاء الاصطناعي لعام 2026" الصادر عن شركة Tenable عن كيفية أن الهويات ذات الصلاحيات المفرطة وتبعيات سلسلة التوريد غير الخاضعة للمراقبة تترك المؤسسات مكشوفة. نقدم لك 10 تكتيكات لإغلاق مسارات الهجوم الأكثر خطورة.
Gartner® تُصنف شركة Tenable بصفتها الشركة الأبرز للمنافسة ("Company to Beat") في تقييم التعرض للمخاطر المدعوم بالذكاء الاصطناعي ضمن تقريرها لعام 2025.
كتبت شركة Gartner "إن تغطية شركة Tenable للأصول وسطح الهجوم، وتطبيقها للذكاء الاصطناعي وسمعتها في تقييم الثغرات الأمنية يجعلها في المقدمة في تقييم التعرض للمخاطر المدعوم بالذكاء الاصطناعي:" في تقرير "AI Vendor Race:Tenable Is the Company to Beat for AI-Powered Exposure Assessment. (سباق بائعي الذكاء الاصطناعي: شركة Tenable هي الشركة الأبرز للمنافسة ("Company to Beat") في مجال تقييم التعرض للمخاطر المدعوم بالذكاء الاصطناعي.)"
Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513)
Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday released, including six zero-day vulnerabilities that were exploited in the wild and three publicly disclosed CVEs.
What Anthropic’s Latest Model Reveals About the Future of Cybersecurity
AI can find vulnerabilities with unprecedented speed, but discovery alone doesn’t reduce cyber risk. We need exposure prioritization, contextual risk analysis, and AI-driven remediation to transform findings into security outcomes.
I pretended to be an AI agent on Moltbook so you don’t have to
I went undercover on Moltbook, the AI-only social network, masquerading as a bot. Instead of deep bot-to-bot conversations, I found spam, scams, and serious security risks.
2025 SLG cyber trends: 5 lessons to build a 2026 cyber roadmap
From school districts to state agencies, 2025 cyber incidents were a wake-up call about asset visibility. Discover five actionable lessons SLG leaders can use to close the cyber exposure gap and move from reactive threat detection and response to proactive exposure management.
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions.
From Clawdbot to Moltbot to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
Moltbot, the viral AI agent, is riddled with critical vulnerabilities, exposed control interfaces, and malicious extensions that put users' sensitive data at risk. Understand the immediate security practices you can implement to mitigate this enormous agentic AI security risk.
Frequently Asked Questions About Notepad++ Supply Chain Compromise
Threat actors compromised the update infrastructure for Notepad++, redirecting traffic to an attacker controlled site for targeted espionage purposes.