Tenable-Studie zur Cloud-Sicherheit: Ganze 95 % der befragten Unternehmen verzeichneten über einen Zeitraum von 18 Monaten eine Sicherheitsverletzung mit Cloud-Bezug
Dieses Ergebnis aus der Tenable-Studie Cloud Security Outlook 2024 zeigt eindeutig, wie wichtig proaktive und robuste Cloud-Sicherheit ist. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud…
FlowFixation: AWS Apache Airflow Service Takeover Vulnerability and Why Neglecting Guardrails Puts Major CSPs at Risk
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of…
IDC stuft Tenable das fünfte Jahr in Folge auf Platz 1 beim weltweiten Marktanteil für Device Vulnerability Management ein
Der neueste Bericht des Marktforschungsunternehmens bietet zudem Markteinblicke, die Sicherheitsexperten nutzen können, um ihre Strategie für das Schwachstellenmanagement zu verbessern.
Pig Butchering Scam: From Tinder and TikTok to WhatsApp and Telegram, How Scammers Are Stealing Millions in a Long Con
In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This blog highlights the who and the how of Pig butchering scams, and details the Pig butchering…
Pig Butchering Scam: How Bitcoin, Ethereum, Litecoin and Spot Gold (XAUUSD) Investments Are Used in Romance Scams to Steal Hundreds of Millions
This is the second part of a two-part series based on firsthand research into pig butchering scams from the end of 2022 into early 2024. In this post, we delve into the types of investment scams perpetrated by pig butchers to steal hundreds of millions of dollars from victims, including in the form…
The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data
Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control.
Maximize Your Vulnerability Scan Value with Authenticated Scanning
Want to get a lot more value out of your vulnerability scans? Start doing authenticated scanning
Navigating the Roadblocks: Overcoming People, Process, and Technology Challenges for Preventive Security in Japan
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your Japanese organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable.
ApatchMe - Authenticated Stored XSS Vulnerability in AWS and GCP Apache Airflow Services
Unpatched Apache Airflow instances used in Amazon Web Services (AWS) and Google Cloud Platform (GCP) allow an exploitable stored XSS through the task instance details page.
What’s Stopping Organisations in India from Practicing Preventive Cybersecurity?
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your Indian organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable.
How People, Process and Technology Challenges are Standing in the Way of Preventive Security in Australia
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your Australian organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable.
People, Process and Technology Challenges Stand in the Way of Preventive Security in Asia Pacific
Uncover the obstacles hindering preventive cybersecurity and ways to build cyber resilience for your APAC organisation in a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable.