MrBeast Scams: Verified Accounts, DeepFakes Used in Impersonations to Promote Fake Giveaways on YouTube and TikTok
October 4, 2023CVE-2023-22515: Zero-Day Vulnerability in Atlassian Confluence Data Center and Server Exploited in the Wild
October 4, 2023CVE-2023-22515: Zero-Day Vulnerability in Atlassian Confluence Data Center and Server Exploited in the Wild A critical zero-day vulnerability in Atlassian Confluence Data Center and Server has ...
How to Meet FY 2023 U.S. State and Local Cybersecurity Grant Program Objectives
October 4, 2023This is the first of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP. In 2021, the U.S. Infrastr...
New U.S. SLCGP Cybersecurity Plan Requirement: Adopt Cybersecurity Best Practices Using CISA's CPGs
October 4, 2023This is the second of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP.
CVE-2023-40044, CVE-2023-42657: Progress Software Patches Multiple Vulnerabilities in WS_FTP Server
October 2, 2023Progress Software patches multiple flaws in its WS_FTP Server product, including a pair of critical flaws, one with a maximum CVSS rating of 10
Tenable Cyber Watch: DHS Tracks New Ransomware Trends as Attacks Drive Up Cyber Insurance Claims, and more
October 2, 2023This week’s edition of Tenable Cyber Watch unpacks new ransomware trends spotted by the U.S. Department of Homeland Security and addresses the surge in cyber insurance claims due to ransomware attacks. Also covered: A look into Snatch. Why is CISA warning critical infrastructure organizations about this ransomware?
Cybersecurity Snapshot: CISOs See Budgets Tighten, as Cyberthreats Intensify
September 29, 2023After double-digit growth in the past two years, cybersecurity budgets expanded more modestly in 2023. Plus, a survey offers an inside look at how organizations are grappling with cyber challenges. In addition, the U.S. and Japan warn about a China-linked group that’s stealthily compromising network devices. And much more!
CISA Adds Vulnerabilities Exploitable Via Bluetooth to KEV
September 28, 2023Recently, CISA added four vulnerabilities for Owl Labs Meeting Owl devices to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities are exploitable via Bluetooth Low Energy (BLE). This means an attacker would need to be physically near the device in order to exploit it.
Empowering Cybersecurity Excellence: IBM and Tenable Collaborate for IT/OT Security Innovation
September 28, 2023IBM and Tenable put IT/OT security on display at IBM's Watson Center in Munich with the QRadar and Tenable OT Security integration — showcasing industrial security, protection and asset management for joint customers and partners.
CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities
September 27, 2023Frequently asked questions relating to vulnerabilities in Apple, Google and the open source libwebp library.
CVE-2023-29357, CVE-2023-24955: Exploit Chain Released for Microsoft SharePoint Server Vulnerabilities
September 27, 2023A proof-of-concept exploit chain has been released for two vulnerabilities in Microsoft SharePoint Server that can be exploited to achieve unauthenticated remote code execution. Update Octobe...
Tenable Cyber Watch: U.S. Advises on Deepfake Threats, Best Practices for Securing AI Systems, and more
September 25, 2023This week’s edition of Tenable Cyber Watch unpacks preparing for deepfake threats and addresses CISA’s roadmap for open source security. Also covered: tips and best practices for securing AI systems. ...
Cybersecurity Snapshot: DHS Tracks New Ransomware Trends, as Attacks Drive Up Cyber Insurance Claims and Snatch Variant Triggers Alert
September 22, 2023Check out the new ransomware trends documented by DHS, as well as a joint CISA-FBI alert about the Snatch ransomware. Plus, find out what CISA has in store for its Known Exploited Vulnerabilities catalog. Furthermore, don’t miss new source-code management tips from the OpenSSF. And much more!