Tenable Network Security Podcast Episode 164 - "Detecting Portable Devices, Losing Private Keys"

‹ Previous Post
Nessus Turns 15!
Blog Home
Next Post ›
Recap: Geeking Out II with Marcus
Welcome to the Tenable Network Security Podcast Episode 164


New & Notable Plugins


Passive Vulnerability Scanner

Vulnerability Detection

General Detection

From the plugin description: Financial Information eXchange (FIX) protocol. The remote client is running a FIX application. This protocol is used by financial institutions to exchange data. The FIX protocol has very few built-in security controls and, instead, relies on industry standard encryption (PGP, SSL/TLS, etc.) to protect the stream. The PVS has just observed this client initiate a LOGON request without encryption set.

SecurityCenter Report Templates

  • Exploits By Platform - Traces the exploitability of vulnerabilities in your environment using the three most popular exploit frameworks


  1. AMI Firmware Source Code, Private Key Leaked | threatpost
  2. Command Injection Tips: Leveraging Command-line Kung Fu with nslookup
  3. Bitcoin-mining malware enslaves computers
  4. Veracode Predicts Rise of "Everyday Hacker"
  5. Parking Ticket Firm Exposes Private Information
  6. Fake Twitter Followers Becomes Multimillion Dollar Business

Filed Under: ,