Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

January 19, 2024

Use seus logs internos para ter uma resposta melhor a incidentes e detecção de anomalias

Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks....


January 18, 2024

Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions

The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....


January 17, 2024

Atualização de patch crítico de janeiro de 2024 da Oracle trata de 191 CVEs

Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates....


January 16, 2024

CVE-2023-6548, CVE-2023-6549: Vulnerabilidades de dia zero exploradas no Citrix NetScaler ADC e NetScaler Gateway

Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws....


January 16, 2024

Além do horizonte: as 5 principais tendências de segurança na nuvem a serem observadas em 2024

Não há dúvidas de que a IA generativa impulsionará os recursos de segurança cibernética das organizações. No entanto, os departamentos de segurança cibernética colherão poucos frutos com a IA generativa sem antes aplicar princípios sólidos de segurança da nuvem. In this blog, we explain the top cloud security trends that organizations must track – an...


January 12, 2024

Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks

Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and h...


January 10, 2024

CVE-2023-46805, CVE-2024-21887: Vulnerabilidades de dia zero exploradas nos gateways Ivanti Connect Secure e Policy Secure

Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors....


January 9, 2024

O Patch Tuesday de janeiro de 2024 da Microsoft aborda 48 CVEs (CVE-2024-20674)

Microsoft addresses 48 CVEs in its January 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities....


January 9, 2024

Como criar ambientes de OT resilientes: proteção para empresas de energia elétrica

Os recentes ataques cibernéticos a infraestruturas críticas demonstram como os hackers podem tirar proveito dos sistemas de controle industrial. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....


January 8, 2024

Aprenda a gostar da auditoria e conformidade. Sim, é possível

Proteger cargas de trabalho em execução na nuvem pública e atender às normas de conformidade não é algo negociável para a maioria das organizações. No entanto, reunir os recursos necessários de visibilidade, mapeamento e monitoramento é muitas vezes um processo manual e demorado. As a result, audits and compliance exercises ...


January 5, 2024

Cybersecurity Snapshot: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang

Want to learn more about protecting AI systems from malicious actors? A new NIST guide aims to help you identify and mitigate attacks targeting AI tools. Plus, new granular configuration recommendations for securing Microsoft 365 are out. In addition, the cost of cyber incidents is rising. And there...


January 3, 2024

$18.2 Million Funding Available for Tribal Government Cybersecurity

The Tribal Cybersecurity Grant Program (TCGP) is accepting applications through January 10, making $18.2 million in federal grant funding available to eligible tribes to reduce cyber risk....


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

A falha Apache Log4j coloca software de terceiros em evidência

Veja os detalhes >