Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

From Vulnerability Discovery to Remediation: How Tenable and HCL BigFix Can Help

Reducing the time required to move from vulnerability assessment to remediation is a never ending challenge for most organizations. Here's how the integration between Tenable and HCL BigFix can help y...

Nicholas Weeks Nicholas Weeks
June 30, 2021

CVE-2021-1675: Proof-of-Concept Leaked for Critical Windows Print Spooler Vulnerability

Researchers published and deleted proof-of-concept code for a remote code execution vulnerability in Windows Print Spooler, called PrintNightmare, though the PoC is likely still available. Update Jul...

Claire Tills Claire Tills
June 29, 2021

Find Your Fit on Team Tenable

Engineering, human resources, product management and billing: Here's how four employees with a wide range of skills are making their mark in cybersecurity. At Tenable, we're united in a common missio...

Team Tenable
June 29, 2021

CVE-2020-3580: Proof of Concept Published for Cisco ASA Flaw Patched in October

Researchers at Positive Technologies have published a proof-of-concept exploit for CVE-2020-3580. There are reports of researchers pursuing bug bounties using this exploit. Update June 28: The Backgr...

Claire Tills Claire Tills
June 24, 2021

Elon Musk and YouTube Advertising Scams: Fake SpaceX “Coin” Promoted in Ads During Cryptocurrency Videos

Scammers are on pace to steal nearly $1 million USD from unsuspecting users through a popular decentralized finance protocol, Uniswap, by abusing YouTube to promote a fake SpaceX coin as part of ads a...

Satnam Narang Satnam Narang
June 24, 2021

CVE-2021-20019: SonicWall Fixes Incomplete Patch for CVE-2020-5135

SonicWall issues a new advisory and CVE identifier to address an incomplete fix for CVE-2020-5135. Background On June 22, SonicWall published an advisory (SNWLID-2021-0006) to address an incomplete ...

Satnam Narang Satnam Narang
June 23, 2021

Configuring The Ports That Nessus Scans

When only select ports require scanning, use these easy steps to define them When assessing targets with a network scanner like Nessus, a common question is "How do I control the ports that Nessus te...

Seth Matheson Seth Matheson
June 21, 2021

8 Active Directory Best Practices to Minimize Cybersecurity Risk

Follow these best practices to harden your Active Directory security against cyberattacks and stop attack paths. Active Directory (AD) equips businesses using Windows devices to organize IT managemen...

Sylvain Cortes Sylvain Cortes
June 17, 2021

How to Discover and Continuously Assess Your Entire Attack Surface

To eliminate network blind spots and fully understand your entire attack surface, it's essential to determine which discovery and assessment tools are required for each asset type. If you've been in ...

Jeff Aboud Jeff Aboud
June 16, 2021

Microsoft Teams: Vulnerability in Microsoft Power Apps Service Allows Theft of Emails, Files and More

A flaw in Microsoft Power Apps could allow attackers to steal emails, Teams messages and OneDrive files. Background Microsoft recently patched a vulnerability in Microsoft Teams, a business communic...

Security Response Team
June 14, 2021

How to Protect Active Directory Against Ransomware Attacks

Ransomware attacks every type of organization from every angle and Active Directory remains the common target. Stop privilege escalation by fixing these key AD and group policy misconfigurations. Ran...

Derek Melber Derek Melber
June 14, 2021

Microsoft’s June 2021 Patch Tuesday Addresses 49 CVEs (CVE-2021-31955, CVE-2021-31956 and CVE-2021-33742)

Microsoft addresses 49 CVEs with six having been observed as exploited in the wild 5Critical 44Important 0Moderate 0Low Microsoft patched 49 CVEs in its June 2021 Patch Tuesday release, inclu...

Security Response Team
June 8, 2021

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.

Tenable.ad

Continuously detect and respond to Active Directory attacks. No agents. No privileges. On-prem and in the cloud.