Tenable-Blog
Cybersecurity Snapshot: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan

CVE-2023-6548, CVE-2023-6549: Zero-Day Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway
Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws....
Blick über den Tellerrand: Top 5 Cloud-Sicherheitstrends, die Sie 2024 im Auge behalten sollten
Generative KI wird die Cybersecurity-Funktionen von Unternehmen zweifellos verbessern. Allerdings wird generative KI Cybersecurity-Abteilungen nur wenige Vorteile einbringen, wenn diese nicht zuvor solide Grundprinzipien der Cloud-Sicherheit durchsetzen. In this blog, we explain the top cloud security trends that organizations must track – an...
Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks
Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and h...
CVE-2023-46805, CVE-2024-21887: Zero-Day Vulnerabilities Exploited in Ivanti Connect Secure and Policy Secure Gateways
Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors....
Microsoft’s January 2024 Patch Tuesday Addresses 48 CVEs (CVE-2024-20674)
Microsoft addresses 48 CVEs in its January 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities....
Resiliente OT-Umgebungen schaffen: Schutzmaßnahmen für Stromversorger
Die jüngsten Cyberangriffe auf kritische Infrastruktur haben gezeigt, wie Hacker industrielle Steuerungssysteme ausnutzen können. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....
Eine Leidenschaft für Audits und Compliance entwickeln? Es ist möglich!
Ausgeführte Workloads in der Public Cloud abzusichern und Compliance-Standards einzuhalten, stellt für den Großteil der Unternehmen eine zwingende Notwendigkeit dar. Doch das Zusammenführen der notwendigen Sichtbarkeits-, Mapping- und Monitoring-Funktionen erweist sich in vielen Fällen als manueller, zeitaufwendiger Prozess. As a result, audits and compliance exercises ...
Cybersecurity Snapshot: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang
Want to learn more about protecting AI systems from malicious actors? A new NIST guide aims to help you identify and mitigate attacks targeting AI tools. Plus, new granular configuration recommendations for securing Microsoft 365 are out. In addition, the cost of cyber incidents is rising. And there...
$18.2 Million Funding Available for Tribal Government Cybersecurity
The Tribal Cybersecurity Grant Program (TCGP) is accepting applications through January 10, making $18.2 million in federal grant funding available to eligible tribes to reduce cyber risk....