Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

November 24, 2025

FAQ About Sha1-Hulud 2.0: The "Second Coming" of the npm Supply-Chain Campaign

Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to immediately audit for at least 800 compromised packages.

November 10, 2025

Tenable ein führender Anbieter im ersten Gartner® Magic Quadrant™ for Exposure Assessment Platforms

Unsere Kunden beweisen, was Exposure Management leisten kann. Vielen Dank, dass Sie uns vertrauen und uns Teil Ihrer Mission sein lassen.


November 7, 2025

Cybersecurity Snapshot: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework

Learn why Google expects AI to transform cyber defense and offense next year, and explore MITRE's major update to the ATT&CK knowledge base. We also cover a new McKinsey playbook for agentic AI security, along with the latest on Microsoft Exchange protection and the CIS Benchmarks.


November 6, 2025

What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation

We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.


November 6, 2025

Why Security and IT Disagree on Patching (and Why That's a Good Thing)

Let's be frank, for most organizations, patching is a mess. It's the flashpoint where two of the most critical departments in the company, security and IT, seem to be working against each other.


November 5, 2025

7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution

Not all exposure management platforms are created equal. But how can you pick the right one for your organization? Here’s a set of questions designed to help you cut through vendor noise and make an informed decision.


November 5, 2025

HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage

Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.


November 4, 2025

Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security

Discover how the latest NERC CIP standard for Internal Network Security Monitoring (INSM) shifts the focus inside your network, and how Tenable can help deliver the comprehensive visibility required to achieve compliance and enhance security.


October 31, 2025

Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness

Many organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks.


October 30, 2025

Minimierung des Wirkungsradius von Schwachstellen in der Cloud

Tenable Cloud Security vereinheitlicht Sichtbarkeit in der Code-, Build- und Runtime-Phase. Die Lösung korreliert Schwachstellen, Identitäten und Fehlkonfigurationen, um sie anhand ihrer Ausnutzbarkeit zu priorisieren und Eindämmungsmaßnahmen zu automatisieren. Dies hilft Teams, Risiken zu erkennen, unter Kontrolle zu bringen und zu beseitigen – über Multi-Cloud- und Hybrid-Umgebungen hinweg.


Aktuelles zum Thema Cybersecurity

Geben Sie Ihre E-Mail-Adresse ein, um zeitnahe Warnungen und Sicherheitsempfehlungen von den Experten bei Tenable zu erhalten.

Ein Einblick in das Ransomware-Ökosystem

Bericht herunterladen >

× Vertriebsteam kontaktieren