Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

June 26, 2023

Tenable Cyber Watch: Verizon DBIR Warns About BEC and Ransomware, Cloud Security Tops CISOs’ Concerns, and more

This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’ coun...


June 23, 2023

CVE-2023-33299: Critical Remote Code Execution Vulnerability in FortiNAC

Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC...


June 23, 2023

Cybersecurity Snapshot: As Feds Hunt CL0P Gang, Check Out Tips on Ransomware Response, Secure Cloud Management and Cloud App Data Privacy

Learn all about the U.S. government’s reward for CL0P ransomware leads. Plus, check out ransomware incident response recommendations. Also, review concrete guidance on cloud system administration and on designing cloud apps with privacy by default. And much more!...


June 21, 2023

Shared Responsibility Model in the Cloud

CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture....


June 19, 2023

Tenable Cyber Watch: Osten Government Updates Ransomware Guide, Lineaje Study Reveals Supply Chain Risks in OSS, and more

This week’s edition of the Tenable Cyber Watch unpacks the most recent updates to the U.S. government’s #StopRansomware Guide and addresses the steps organizations can take to boost digital trust. Also covered: why companies must be careful when using open source software. ...


June 16, 2023

FAQs zu den Schwachstellen bei der MOVEit-Datenübertragung und zur CL0P Ransomware-Bande

Frequently asked questions relating to vulnerabilities in MOVEit Transfer, including one that was exploited by the prolific CL0P ransomware gang....


June 16, 2023

Cybersecurity Snapshot: Für solide Cloud-Sicherheit: Konzentration auf Konfiguration

Check out the NCSC’s advice about proper configuration in cloud security. Plus, a detailed guide about LockBit ransomware. Also, don’t miss OWASP’s revised list of top API security risks. Plus, CISA’s warning about remote network management tools. And much more!...


June 14, 2023

CVE-2023-20887: VMware Aria Operations für Networks Command Injection

VMware issues advisory to address three flaws in its VMware Aria Operations for Networks solution, including a critical command injection flaw assigned a CVSSv3 score of 9.8....


June 13, 2023

Microsoft’s June 2023 Patch Tuesday Addresses 70 CVEs (CVE-2023-29357)

Microsoft addresses 70 CVEs in its June 2023 Patch Tuesday update including six rated as critical....


June 12, 2023

CVE-2023-27997: Heap-Based Buffer Overflow in Fortinet FortiOS and FortiProxy SSL-VPN (XORtigate)

Fortinet says a critical flaw in its SSL-VPN product may have been exploited in the wild in a limited number of cases. Organizations are strongly encouraged to apply these patches immediately....


June 12, 2023

Tenable Cyber Watch: Six Critical and Common Cyber Misconceptions, Best Practices to Boost IAM Security, and more

This week’s edition of the Tenable Cyber Watch unpacks the six most critical and common cyber misconceptions and shares tips on how to better distribute software bills of materials. Also covered: the best practices to boost IAM security from CISA and the NSA. ...


June 9, 2023

Cybersecurity Snapshot: Building Your Own ChatGPT? Learn How To Avoid Security Risks of AI Models

Find out why cyber teams must get hip to AI security ASAP. Plus, check out the top risks of ChatGPT-like LLMs. Also, learn what this year’s Verizon DBIR says about BEC and ransomware. Plus, the latest trends on SaaS security. And much more!...


Aktuelles zum Thema Cybersecurity

Geben Sie Ihre E-Mail-Adresse ein, um zeitnahe Warnungen und Sicherheitsempfehlungen von den Experten bei Tenable zu erhalten.

Apache Log4j-Sicherheitslücke rückt Drittanbieter-Software ins Rampenlicht

Lesen Sie die Details >