Media room
Tenable news, announcements and global media coverage
Esta é a sala de imprensa da Tenable. Leia nossos anúncios mais recentes e cobertura de mídia, encontre informações de contato globais e faça download do nosso kit de mídia abaixo.
Get the latest Tenable news
Entre lançamentos de produtos inovadores, relatórios de pesquisa da indústria e parcerias estratégicas, obtenha as notícias e os anúncios oficiais mais recentes da Tenable diretamente em sua caixa de entrada.
Comunicados à Imprensa
A Tenable Research revela que ferramentas populares de IA usadas em ambientes de nuvem são altamente vulneráveis
Tenable Plans to Acquire Vulcan Cyber, Accelerate Leadership in Exposure Management
Frost & Sullivan Names Tenable a Growth and Innovation Leader in the Global Vulnerability Management Market, 2021
Most widely exploited vulnerabilities in 2023 were zero days
While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.
Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.
- Cybersecurity
Russia's APT29 Mimics AWS Domains to Steal Windows Credentials
Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.
"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."
That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."
- Cyber Breaches
- Cybersecurity
Tenable integrates DSPM, AI-DSPM to cloud security platform
Exposure management provider Tenable has introduced new data security posture management and artificial intelligence security posture management capabilities to its Tenable Cloud Security platform. The updates, available to Tenable Cloud Security and Tenable One customers, address the increasing complexity of cloud environments, which often face risks from misconfigurations, overexposed workloads, and excessive privileges. Tenable Research identified that 38% of organizations struggle with a "toxic cloud triad" -- a combination of exposed, vulnerable, and highly privileged cloud workloads.
- Business
Dependency Confusion Could Have Led to RCE in Google Cloud Platform
Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.
- Cybersecurity
IoT Unplugged – S3:E7 – Establishing priorities for Cloud security
In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation
Security Week •A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.
- Business
- Cybersecurity
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ep 182: AI Efficiencies in Cyber – A Double-Edged Sword
Everyday AI •CTO Glen Pendley was interviewed on the Everyday AI podcast this week, talking about generative AI use cases for cyber defenders, highlighting Tenable ExposureAI, which helps customers search faster, analyze faster and make decisions faster.
- Business
- Cybersecurity
Security in the metaverse, hyper-personalisation and how world events influence cyber incidents
2Factors •- Corporate News
- Cyber Breaches
- Cybersecurity
Satnam Narang talks about the ransomware boom
TickerTV •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Satnam Narang on metaverse threats
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Marty Edwards reflects on the one year anniversary of the Colonial Pipeline attack
KBKast •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
A year after the Colonial Pipeline attack – have we learnt anything?
Times of India •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
One year on from the attack on Colonial Pipeline - have we learnt anything?
Ticker Insight •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
Immediate Action Required to Protect OT Assets of Critical Infrastructure Facilities
InfoSecurity •- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Energy
- Vulnerability Management
Congress backs push for national cyber czar
The Hill •- Corporate News
- Cyber Policy
- Cybersecurity
- Government
Do we need tougher breach notification rules?
Computing •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Federal Commission Calls for Civilian Cyber Reserve Corps
The Wall Street Journal Pro •- Cyber Policy
- Government
NIS Directive: One Year On – Has it Been Enough?
Infosecurity Magazine •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Energy
- Government
- Vulnerability Management
Cybersecurity experts fear fallout from Apple case
The Hill •- Cyber Policy
- Cybersecurity
IoT Unplugged – S3:E7 – Establishing priorities for Cloud security
IoT Insider •In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Apple sends out iPhone spyware warnings in 92 countries: What you need to know
The National •Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Two zero-days fixed in Microsoft's Patch Tuesday update
Computing •Speaking about this month's Patch Tuesday, senior staff research engineer Satnam Narang told Computing that the update is a reminder that flaws in Secure Boot persist and we could see more malicious activity related to Secure Boot in the future.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable
Channel Biz •In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region
- Business
- Cybersecurity
- Vulnerability Management
Cloud security: an identity problem - Security Insights
Security Insights •Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.
- Cyber Breaches
- Cyber Exposure Live
- Cyber Policy
- Cybersecurity
- Products
- Vulnerability Management
Tenable Research Finds Scammers Made Over $10 Million with Fake Cryptocurrency Giveaway Scams
AiThority •- Cybersecurity
- Surveys / Research Data
The cybersecurity lessons from 2020
IoT Now •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Satnam Narang discusses key findings from Tenable Threat Landscape Retrospective report
TickerTV Australia •- Business
- Cyber Breaches
- Surveys / Research Data
Coming in at number 5, it's a blast from the past! Tenable's 2020 security flaw chart show features hits of yesteryear
The Register •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Ransomware attacks now to blame for half of healthcare data breaches
ZDNet •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Why Gen Z traders are turning to TikTok for stock tips and money advice
Daily Telegraph •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Why organisations must protect data from the quantum threat
Technology Magazine •In an interview with Technology Magazine Deputy CTO, Gavin Millard, discusses the threat from quantum computing arguing that, "As advances in quantum computing are made, decryption at lightning speed is increasingly possible".
- Cybersecurity
- Vulnerability Management
2525: Tenable – Hacker Trends and Cybersecurity with Nico Popp
Tech Talk Podcast •In conversation with Neil C. Hughes for this Tech Talk podcast, Chief Product Officer Nico Popp discussed the escalating challenges of cloud security and hacker trends.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Patch Tuesday: Microsoft fixes zero-days in Word and Streaming Service
Computer Weekly •Satnam Narang, senior staff research engineer, discussed the potential impact of CVE-2023-36761 patched in this month's update.
- Cybersecurity
- Vulnerability Management
Patch Tuesday September 2023: two zero days for the start of the school year
Le Monde Informatique •Satnam Narang, senior staff research engineer, offered his analysis of this month's Microsoft Patch Tuesday update.
- Cybersecurity
- Vulnerability Management
A look at new in the NIS2 Directive
Manufacturing and Logistics IT •In a Q&A with Manufacturing and Logistics IT technical director Bernard Montel takes a deep dive into the changes that manufacturers can expect in the NIS2 Directive.
- Cyber Policy
- Cybersecurity
- Energy
- Vulnerability Management
'Several' US government agencies attacked through MOVEit flaw, CISA
Computing •Tenable CEO, Amit Yoran, shares his thoughts on the Clop Ransomware gang's tactics with Computing Magazine.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Media contacts
Kit de mídia
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.