Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers
Tenable Cloud Security Research Team has recently discovered that Kinsing malware, known for targeting Linux-based cloud infrastructures, exploits Apache Tomcat servers with new advanced stealth techniques. Explore our analysis and the indicators of compromise in this report.
O estudo de segurança da nuvem da Tenable revela que impressionantes 95% das organizações pesquisadas sofreram uma violação relacionada à nuvem em um período de 18 meses
As descobertas do estudo Panorama de segurança da nuvem de 2024 da Tenable são um sinal claro da necessidade de uma segurança proativa e robusta para a nuvem. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud…
Tenable Bolsters Its Cloud Security Arsenal with Malware Detection
Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution…
FlowFixation: Serviço do Apache Airflow da AWS assume a vulnerabilidade, e por que negligenciar as proteções coloca os principais CSPs em risco
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of…
Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable
Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters…
Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment
Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges…
Managed Kubernetes: Is It Right for My Organization?
As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your Kubernetes clusters? And should your organization host its Kubernetes deployments or instead choose a…
How a Serverless Architecture Can Help You Secure Cloud-Native Applications
Cybersecurity teams often struggle with securing cloud-native applications, which are becoming increasingly popular with developers. The good news is that deploying these applications on a serverless architecture can make it easier to protect them. Here’s why.
Líderes em segurança da nuvem expressam seus principais desafios
Muitas identidades, muitos sistemas e muito cacique para pouca tribo obscurecem uma situação já complexa.
Aumente o nível da sua estratégia de segurança da nuvem
Learn how to better your cloud security program with these ten security resolutions.
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.
Além do horizonte: as 5 principais tendências de segurança na nuvem a serem observadas em 2024
Não há dúvidas de que a IA generativa impulsionará os recursos de segurança cibernética das organizações. No entanto, os departamentos de segurança cibernética colherão poucos frutos com a IA generativa sem antes aplicar princípios sólidos de segurança da nuvem. In this blog, we explain the top cloud security trends that organizations must track –…