Tenable-Blog
Öffentlich zugängliche Secrets: Sicherheitslücken bei Cloud-Daten, die Ihr Unternehmen gefährden

Ein praktischer Ansatz zur Risikominderung in Fertigungsstätten
Es wird viel über Cybersecurity für Fertigungsstätten geredet, aber wo beginnen? Machen wir es nicht zu kompliziert und gehen darauf ein, warum Angreifer tun, was sie tun, und was Sie dagegen unternehmen können. Es geht darum, Risiken zu minimieren und Ihre Maßnahmen zu maximieren, um die besten Ergebnisse zu erzielen. Read on to learn mor...
CVSSv4 is Coming: What Security Pros Need To Know
The latest revision of the industry standard for ranking vulnerabilities has some changes that practitioners will find useful. Here, we'll discuss them, as well as Tenable' plans to implement the scoring system in its products....
Tenable Cyber Watch: Verizon DBIR Warns About BEC and Ransomware, Cloud Security Tops CISOs’ Concerns, and more
This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’ coun...
CVE-2023-33299: Critical Remote Code Execution Vulnerability in FortiNAC
Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC...
Cybersecurity Snapshot: As Feds Hunt CL0P Gang, Check Out Tips on Ransomware Response, Secure Cloud Management and Cloud App Data Privacy
Learn all about the U.S. government’s reward for CL0P ransomware leads. Plus, check out ransomware incident response recommendations. Also, review concrete guidance on cloud system administration and on designing cloud apps with privacy by default. And much more!...
Shared Responsibility Model in the Cloud
CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture....
Tenable Cyber Watch: Osten Government Updates Ransomware Guide, Lineaje Study Reveals Supply Chain Risks in OSS, and more
This week’s edition of the Tenable Cyber Watch unpacks the most recent updates to the U.S. government’s #StopRansomware Guide and addresses the steps organizations can take to boost digital trust. Also covered: why companies must be careful when using open source software. ...
FAQs zu den Schwachstellen bei der MOVEit-Datenübertragung und zur CL0P Ransomware-Bande
Frequently asked questions relating to vulnerabilities in MOVEit Transfer, including one that was exploited by the prolific CL0P ransomware gang....
Cybersecurity Snapshot: Für solide Cloud-Sicherheit: Konzentration auf Konfiguration
Check out the NCSC’s advice about proper configuration in cloud security. Plus, a detailed guide about LockBit ransomware. Also, don’t miss OWASP’s revised list of top API security risks. Plus, CISA’s warning about remote network management tools. And much more!...