Tenable-Blog
CVE-2025-64446: Fortinet FortiWeb Zero-Day Path Traversal Vulnerability Exploited in the Wild
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
Learn why you should revise your Akira ransomware safeguards and see what’s new in OWASP’s revamped Top 10 Web Application Risks. We also cover agentic AI’s cognitive degradation risk, hackers' abuse of Anthropic's agentic AI, the latest AI security trends, and new data on CISO compensation.
How Rapid AI Adoption Is Creating an Exposure Gap
As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it.
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215)
Microsoft addresses 63 CVEs including one zero-day vulnerability which was exploited in the wild.
Tenable ein führender Anbieter im ersten Gartner® Magic Quadrant™ for Exposure Assessment Platforms
Unsere Kunden beweisen, was Exposure Management leisten kann. Vielen Dank, dass Sie uns vertrauen und uns Teil Ihrer Mission sein lassen.
Cybersecurity Snapshot: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework
Learn why Google expects AI to transform cyber defense and offense next year, and explore MITRE's major update to the ATT&CK knowledge base. We also cover a new McKinsey playbook for agentic AI security, along with the latest on Microsoft Exchange protection and the CIS Benchmarks.
What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation
We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.
Why Security and IT Disagree on Patching (and Why That's a Good Thing)
Let's be frank, for most organizations, patching is a mess. It's the flashpoint where two of the most critical departments in the company, security and IT, seem to be working against each other.
7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution
Not all exposure management platforms are created equal. But how can you pick the right one for your organization? Here’s a set of questions designed to help you cut through vendor noise and make an informed decision.
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.