Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.

December 13, 2022

How To Assess the Cybersecurity Preparedness of IT Service Providers and MSPs

Improperly evaluating the cybersecurity capabilities of prospective IT service providers and managed service providers (MSPs) can put your organization's data and systems at risk. A new guide from CompTIA can help you ask the right questions.


December 12, 2022

CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNs

Fortinet has patched a zero day buffer overflow in FortiOS that could lead to remote code execution. There has been a report of active exploitation and organizations should patch urgently.


December 12, 2022

What Happens When the Metaverse Enters Your Attack Surface?

Tenable polled 1,500 cybersecurity, IT and DevOps professionals about their top concerns in the nascent virtual reality worlds of the metaverse. Here's what we found out.


December 12, 2022

Tenable Cyber Watch: Shift Left Challenges, Anti-Ransomware Efforts, Quantum Risks and CISO Anxiety

Beat the Monday blues with cyber news you can use | Shift-left efforts falling short. The White House’s war on ransomware. Everything you’ve ever wanted to know about CISOs. The quantum computing risk for critical infrastructure. Don’t miss the latest episode of the Tenable Cyber Watch. The…


December 9, 2022

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! 


December 8, 2022

Cloud-Sicherheit: 5 wichtige Erkenntnisse aus der DevSecOps-Umfrage von SANS

Ein aktueller Report des SANS Institute kommt zu dem Schluss, dass DevSecOps-Teams zwar ihre Tools, Prozesse und Techniken verbessern, die zunehmend hybriden und Multi-Cloud-IT-Umgebungen ihrer Unternehmen jedoch immer schwieriger abzusichern sind. Informieren Sie sich über die wichtigsten Ergebnisse der „SANS 2022 DevSecOps-Umfrage".


December 6, 2022

Are You Ready for the Next Log4Shell? Tenable’s CSO and CIO Offer Their Advice

Tenable CIO Patricia Grant and CSO Robert Huber share insights and best practices to help IT and cybersecurity leaders and their teams weather the next cyber crisis of Log4j proportions.


December 5, 2022

NETGEAR Router Misconfiguration Opens The Door For Remote Attacks

Tenable Research has discovered a configuration issue impacting NETGEAR Nighthawk WiFi6 Routers commonly used in small offices and large homes. Organizations need to manually apply firmware updates.


December 5, 2022

Introducing the Tenable Cyber Watch, Your Weekly Cyber Newscast

Cybersecurity professionals are inundated with too much information. Separating the signal from the noise is hard. The Tenable Cyber Watch is here to help. Today, Tenable launches Cyber Watch, a weekly video news program highlighting topics that are top-of-mind for cybersecurity professionals…


Cybersecurity-Nachrichten, die Ihnen nutzen können

Geben Sie Ihre E-Mail-Adresse ein, um keine aktuellen Warnungen und Sicherheitshinweise der Experten von Tenable zu verpassen.