Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

October 22, 2025

Cybersecurity Awareness Month Is for Security Leaders, Too

Think you know all there is to know about cybersecurity? Guess again. Shadow AI is challenging security leaders with many of the same issues raised by other “shadow” technologies. Only this time, it’s evolving at breakneck speed.


October 21, 2025

Oracle October 2025 Critical Patch Update Addresses 170 CVEs

Oracle addresses 170 CVEs in its final quarterly update of 2025 with 374 patches, including 40 critical updates.


October 17, 2025

Cybersecurity Snapshot: F5 Breach Prompts Urgent U.S. Gov’t Warning, as OpenAI Details Disrupted ChatGPT Abuses

F5’s breach triggers a CISA emergency directive, as Tenable calls it “a five-alarm fire” that requires urgent action. Meanwhile, OpenAI details how attackers try to misuse ChatGPT. Plus, boards are increasing AI and cyber disclosures. E muito mais.


October 16, 2025

F5 BIG-IP Breach: 44 CVEs That Need Your Attention Now

Partnering with an EDR vendor after a nation-state has already stolen your source code isn’t innovation — it’s a gamble. You don’t build a fire extinguisher while the house is burning. You find every spark before it becomes the next inferno.Key takeaways:F5’s BIG-IP is used to secure everything…


October 16, 2025

Tenable Discovers Critical Vulnerabilities in SimpleHelp Tool: CVE-2025-36727 and CVE-2025-36728

Tenable Research found two flaws in SimpleHelp’s remote-support tool that can be chained together to gain remote code execution on clients' devices. SimpleHelp has patched them: CVE-2025-36728 in version 5.5.11 and CVE-2025-36727 in version 5.5.12.


October 15, 2025

Frequently Asked Questions About The August 2025 F5 Security Incident

Frequently asked questions about the August 2025 security incident at F5 and the release of multiple BIG-IP product patches.


October 15, 2025

O custo humano do risco cibernético: como o gerenciamento de exposição pode aliviar o burnout na área de segurança

O verdadeiro custo do risco cibernético é o custo humano. Ferramentas isoladas e operações descoordenadas não estão apenas colocando em risco o seu negócio, mas também causando um impacto significativo nas suas equipes. Já passou da hora de eliminar as dificuldades na área de segurança cibernética com uma abordagem unificada e proativa.


October 14, 2025

Microsoft’s October 2025 Patch Tuesday Addresses 167 CVEs (CVE-2025-24990, CVE-2025-59230)

Microsoft addresses 167 CVEs in its largest Patch Tuesday to date, including three zero-day vulnerabilities, two of which were exploited in the wild.


October 14, 2025

Relying on EDR for Exposure Management? Here’s What You Need to Know

Endpoint detection and response tools may serve you well when it comes to handling incident response. But, when used for exposure management, they can leave you blind to large portions of your attack surface.


October 10, 2025

Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find

Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.


October 8, 2025

Gerenciamento de exposição além dos endpoints

Confiar em uma abordagem centrada em endpoints para o gerenciamento de exposição pode gerar pontos cegos que aumentam os riscos. Você precisa ver seu ambiente como um invasor o vê.


October 7, 2025

Não deixe que a segurança da nuvem seja afetada por um caso grave de acúmulo de permissões indevidas

Geralmente, as equipes de segurança da nuvem não percebem uma das maiores ameaças aos ambientes de nuvem: uma rede de identidades com excesso de privilégios que gera vias de ataque para os invasores. Saiba como recuperar o controle das suas identidades na nuvem automatizando a aplicação de privilégios mínimos no seu ambiente.


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A falha Apache Log4j coloca software de terceiros em evidência

Veja os detalhes >

× Entre em contato com nossa equipe de vendas