Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

July 16, 2025

OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services

Tenable Research discovered a Remote Code Execution (RCE) vulnerability (now remediated) in Oracle Cloud Infrastructure (OCI) Code Editor. We demonstrated how an attacker could silently 1-click hijack a victim’s Cloud Shell environment and potentially pivot across OCI services. The vulnerability also affected Code Editor’s integrated services such as Resource Manager, Functions and Data Science.

October 23, 2023

Study: Tenable Offers Fastest, Broadest Coverage of CISA's KEV Catalog

Tenable ranked first in multiple vulnerability management categories, including the most comprehensive coverage and quickest detection of CISA's Known Exploited Vulnerabilities, according to a Miercom report commissioned by Tenable....


October 23, 2023

Tenable Cyber Watch: U.S., Japan Warn Of Chinese ‘BlackTech’ Attackers, CISA Unveils New HBOM Framework, and more

This week’s edition of Tenable Cyber Watch unpacks BlackTech, the hackers linked to the Chinese government who are stealthily compromising network devices. We also cover two CISA initiatives: A new HBOM framework for hardware supply chain risk and an updated reference architecture for identity secur...


October 20, 2023

Cybersecurity Snapshot: Cyber Teams Adopt GenAI, Integrated Suites To Boost Defenses 

Cyber leaders are embracing generative AI and product suites, while ditching siloed tools. Plus, check out a guide packed with anti-phishing tips, and another one full of IAM security best practices. Also, discover the skills that cybersecurity recruiters value the most. And much more!...


October 19, 2023

CISA and NSA Release Top 10 Cybersecurity Misconfigurations: Wie Tenable helfen kann

The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....


October 18, 2023

Oracle October 2023 Critical Patch Update Addresses 176 CVEs

Oracle addresses 176 CVEs in its fourth quarterly update of 2023 with 387 patches, including 46 critical updates....


October 18, 2023

CVE-2023-4966: Citrix NetScaler ADC and NetScaler Gateway Information Disclosure Exploited in the Wild

A critical information disclosure vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway has been exploited in the wild as a zero-day vulnerability. Organizations are urged to patch immediately....


October 17, 2023

Tenable Cyber Watch: SANS Advises on Maximizing OT Security Budgets; Cybersecurity Awareness Month, and more

This week’s edition of Tenable Cyber Watch unpacks how to maximize shrinking OT security budgets and addresses why CISA is calling on tech vendors to do better as a part of its cybersecurity awareness campaign. Also covered: Ermetic’s new open source tool that helps you assess multi-cloud security. ...


October 17, 2023

Einheitliche IT- und Web-App-Sicherheit: On-Prem-Web App Scanning, integriert in Security Center

On-Prem-Web App Scanning ist ab sofort in Tenable Security Center verfügbar und bietet umfassendes Exposure-Management mit genauen Analysen, Abdeckung der OWASP Top 10 und eine unkompliziert Einrichtung. Here’s what you need to know....


October 16, 2023

CVE-2023-20198: Zero-Day Vulnerability in Cisco IOS XE Exploited in the Wild

A maximum severity CVSS 10 zero-day vulnerability in Cisco IOS XE has been exploited in the wild. Organizations should apply the mitigation steps from Cisco as soon as possible until patches are released....


Aktuelles zum Thema Cybersecurity

Geben Sie Ihre E-Mail-Adresse ein, um zeitnahe Warnungen und Sicherheitsempfehlungen von den Experten bei Tenable zu erhalten.

Ein Einblick in das Ransomware-Ökosystem

Bericht herunterladen >