Blog da Tenable
CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild
Tome cuidado: Como esperar por NVD coloca a sua organização em risco
This is the first of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. We explore the impact of that gap on an organization’s cyber risk and discuss how Tenable can help.
Tome cuidado: Como as estruturas de vulnerabilidade existentes podem deixar a organização exposta
This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and…
Tome cuidado: A Closer Look at the Vulnerabilities Disclosed in 2022
This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable…
Tome cuidado: A Closer Look at Eight Notable CVEs from 2022
This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss…
Tenable Cyber Watch: Nearly 50% of Workers Have Accessed Ex-Employers’ Accounts, Biden Seeks Your Input on AI Accountability, and more
This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have…
Cybersecurity Snapshot: CSA Offers Guidance on How To Use ChatGPT Securely in Your Org
Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. e muito mais.
Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad
Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions.
Apresentamos a avaliação sem agente do Tenable Cloud Security para o Microsoft Azure
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.
Como proteger agências governamentais locais com uma abordagem de segurança Whole-of-State
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…