Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

July 9, 2025

How Tenable Research Discovered a Critical Remote Code Execution Vulnerability on Anthropic MCP Inspector

Tenable Research recently discovered a critical vulnerability impacting Anthropic's MCP Inspector tool, a core element of the MCP ecosystem. In this blog, we provide details on how we discovered the vulnerability in this widely used open-source tool — and what users can do about it..

September 27, 2022

The shift to integrated cybersecurity platforms: a growing trend among CISOs

New ESG and ISSA study shows nearly half of organizations are shifting towards integrated cybersecurity platforms. Here’s why many CISOs are making the shift. Less complexity, more security. The shift to integrated cybersecurity platforms has become a growing trend among CISOs. With security t...


September 23, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending Sept. 23 | A digital trust disconnect between theory and practice | Don’t ignore attack surface management | An SBOM 101 | Report finds hackers targeting small businesses | And much more!...


September 22, 2022

Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident

Upon hearing of a cybersecurity incident, alleged or factual, the most productive thing to do is learn what you can from its main lessons....


September 22, 2022

$1 Billion State and Local Cybersecurity Grant Program Now Open for Applicants

As threats continue to evolve, state and local governments benefit from federal grant funding to bolster their cybersecurity posture....


September 20, 2022

Endlich die „unbekannten Unbekannten“ auf Ihrer gesamten Angriffsoberfläche finden

CISOs graut es vor den „unbekannten Unbekannten“ – Assets, Schwachstellen, Fehlkonfigurationen und Systemschwächen, die das Sicherheitsteam nicht erkannt und daher nicht abgesichert hat. These blind spots represent a golden opportunity for attackers – and a major security risk for organizations....


September 16, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity | Guides to help developers beef up on security | And much more!...


September 15, 2022

AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks

Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks....


September 14, 2022

CVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the Wild

Trend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been exploited in the wild....


September 14, 2022

IDSA Introduces CIEM Best Practices

The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management....


Aktuelles zum Thema Cybersecurity

Geben Sie Ihre E-Mail-Adresse ein, um zeitnahe Warnungen und Sicherheitsempfehlungen von den Experten bei Tenable zu erhalten.

Ein Einblick in das Ransomware-Ökosystem

Bericht herunterladen >