OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
Tenable Research discovered a Remote Code Execution (RCE) vulnerability (now remediated) in Oracle Cloud Infrastructure (OCI) Code Editor. We demonstrated how an attacker could silently 1-click hijack a victim’s Cloud Shell environment and potentially pivot across OCI services. The vulnerability…
أمان سحابي أقوى في خمسة دقائق: تسريع الاستجابة في السحابة
In this sixth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three recommendations that you can quickly roll out to help you expedite, prioritize and fine-tune how you detect and respond to cloud security issues.
أسرار مكشوفة: مخاطر البيانات السحابية التي تُعرض عملك للخطر
تتسرب البيانات والأسرار الحساسة. كيف يمكن لمسؤولي أمن السحابة إيقاف تسرب البيانات والأسرار؟
أمان سحابي أقوى في خمسة دقائق: 3 طرق سريعة لتحسين أمان Kubernetes في GCP
In this fifth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three best practices for quickly hardening your Kubernetes environment’s security in GCP: remove wide inbound access to cluster APIs; remove root permissions from containers; and remove privileged…
أمان سحابي أقوى في خمسة دقائق: How DSPM Helps You Discover, Classify and Secure All Your Data Assets
In this fourth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we turn our attention to securing cloud data, a complex endeavor as data grows exponentially and threats become more sophisticated. Check out five DSPM best practices to sharpen your cloud data security and…
مستقبل إدارة الوصول إلى السحابة: كيف يعيد Tenable Cloud Security تعريف الوصول في الوقت المناسب
تعتمد المقاربات التقليدية للوصول إلى السحابة على أذونات ثابتة ودائمة غالبًا ما تكون مفرطة في الصلاحيات. تعرّف على كيف يؤدي الوصول في الوقت المناسب إلى تغيير قواعد اللعبة بالكامل.
أمان سحابي أقوى في خمسة دقائق: كيفية حماية أعباء العمل السحابية
In the first installment of Tenable’s “Stronger Cloud Security in Five” blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. Today, we turn to securing cloud workloads, which are the…
ConfusedComposer: ثغرة تصعيد الامتيازات التي تؤثر على GCP Composer
Tenable Research discovered a privilege-escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ConfusedComposer. The vulnerability could have allowed an identity with permission (composer.environments.update) to edit a Cloud Composer environment to escalate…
أمان سحابي أقوى في خمسة دقائق: أهمية أمان تكوين السحابة
Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management.
كيفية تنفيذ الوصول في الوقت المناسب: أفضل الممارسات والدروس المستفادة
With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, we’ll share how we implemented JIT access internally at Tenable…
ImageRunner: ثغرة تصعيد الامتيازات التي تؤثر على GCP Cloud Run
Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions but that have edit permissions on Google Cloud Run revisions. The vulnerability could have…
من يخاف من مخاطر الذكاء الاصطناعي في بيئات السحابة؟
The Tenable Cloud AI Risk Report 2025 reveals that 70% of AI cloud workloads have at least one unremediated critical vulnerability — and that AI developer services are plagued by risky permissions defaults. Find out what to know as your organization ramps up its AI game.
