Blog da Tenable
CVE-2025-53786: Frequently Asked Questions About Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability

Tenable Cyber Watch: Feds Offer $10 Million Reward for CL0P Info, Best Practices for Ransomware Incident Response, and more
This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure t...
Cybersecurity Snapshot: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill
Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!...
The Default Toxic Combination of GCP Compute Engine Instances
By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix....
Segurança de OT no setor marítimo: tempestade à frente ou içar velas?
O setor marítimo está navegando em um mar de mudanças quando falamos em segurança cibernética. As embarcações interconectadas e as novas tecnologias que permitem que o mundo da navegação se torne mais eficiente também introduzem o risco cibernético. Here's what you need to know about the challenges and risks these floating cities face —...
How Exposure Management Can Make Pen Testing More Effective
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....
Uma maneira prática de reduzir o risco no chão de fábrica
Existe muita informação sobre segurança cibernética para manufatura, mas por onde começar? Vamos simplificar e abordar por que os invasores fazem o que fazem e como você pode detê-los. Trata-se de reduzir riscos e maximizar seus esforços para obter os melhores resultados. Read on to learn mor...
CVSSv4 is Coming: What Security Pros Need To Know
The latest revision of the industry standard for ranking vulnerabilities has some changes that practitioners will find useful. Here, we'll discuss them, as well as Tenable' plans to implement the scoring system in its products....
Tenable Cyber Watch: O DBIR da Verizon alerta sobre BEC, ransomware, as principais preocupações dos CISOs sobre segurança da nuvem e mais
This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’ coun...
CVE-2023-33299: Vulnerabilidade crítica de execução remota de código no FortiNAC
Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC...