Tenable-Blog
How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable

CVE-2025-54987, CVE-2025-54948: Trend Micro Apex One Command Injection Zero-Days Exploited In The Wild
Trend Micro releases a temporary mitigation tool to reduce exposure to two unpatched zero-day command injection vulnerabilities which have been exploited.
Act Now: $100M in FY25 Cyber Grants for SLTTs Available Before August 15
With over $100 million on the table in FY25 cybersecurity grants, state, local and tribal governments have until August 15, 2025 to apply to secure critical cyber funding to strengthen their defenses.
The AI Security Dilemma: Navigating the High-Stakes World of Cloud AI
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.Artificial Intelligence is no longer on the horizon; it's here, and it's being built and deployed…
Das neue Tenable AI Exposure: Schluss mit Rätselraten – beginnen Sie mit der Absicherung Ihrer KI-Angriffsfläche
Mit Tenable AI Exposure – ab sofort verfügbar in Tenable One – haben Sie stets im Blick, wie Ihre Teams KI-Plattformen nutzen und wo diese Nutzung Daten, Benutzer und Schutzmaßnahmen Ihres Unternehmens in Gefahr bringen könnte.
CVE-2025-54135, CVE-2025-54136: Frequently Asked Questions About Vulnerabilities in Cursor IDE (CurXecute and MCPoison)
Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems.
Frequently Asked Questions About SonicWall Gen 7 Firewall Ransomware Activity
An increase in ransomware activity tied to SonicWall Gen 7 Firewalls has been observed, possibly linked to the exploitation of a zero-day vulnerability in its SSL VPN.
The White House AI Action Plan: A Critical Opportunity to Secure the Future
AI without built-in cybersecurity remains a liability. The AI Action Plan presents a pivotal opportunity to get this right by emphasizing a secure-by-design approach.
In Cybersecurity, We Have to Work Together
The future of cybersecurity depends on open, collaborative platforms that bring the industry's best solutions together.
How Exposure Management Moves Beyond Vulnerability Scans to A Unified View of Risk
Jeden Montag bietet Ihnen die Tenable Exposure Management Academy konkrete, praxisnahe Hilfestellungen, die Sie für einen erfolgreichen Übergang von Schwachstellenmanagement zu Exposure Management benötigen. In this post, we look at the results of a survey taken during a recent Tenable webinar on the level of familiarity with exposure…