Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

May 12, 2025

Detecting Remote Monitoring and Management Tools Used by Attackers

Following up on last year’s LOLDriver plugin, Tenable Research is releasing detection plugins for the top Remote Monitoring and Management (RMM) tools that attackers have been more frequently leveraging in victim environments.

January 16, 2023

Microsoft Azure Virtual Machines: Public IP Configuration Is Not Always As It Seems

If you’re not familiar enough with the SKU attribute of the Azure public IP address, you may think you’re configuring your virtual machines as public to the internet … but you aren’t....


January 13, 2023

Cybersecurity Snapshot: U.S. Gov’t Turns Up Heat on Breach Notifications, While Cyber Concerns Still Hamper Cloud Value

Learn all about the FCC’s plan to accelerate telecom breach reports. Plus, why cyber worries remain a cloud obstacle. Also, find out how to rate your cloud MSP’s cybersecurity strength. Then check out our ad-hoc poll on cloud security. And much more!...


January 12, 2023

Google: Monitor These Emerging Cloud Security Challenges in 2023

A new report from Google outlines a set of evolving threats that cloud security teams should keep an eye on in the new year....


January 10, 2023

Microsoft’s January 2023 Patch Tuesday Addresses 98 CVEs (CVE-2023-21674)

Microsoft addresses 98 CVEs including a zero-day vulnerability that was exploited in the wild....


January 9, 2023

Tenable Cyber Watch: Key 2022 Data for Cloud Security, VM, EASM, Web App Security, and More

It's that time again! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, the weekly video news digest that helps you zero-in on the things that matter right now in cybersecurity. As she does every Monday, Tenable Cyber Watch host Jirah Mickle...


January 8, 2023

Why JIT Access is an Essential Part of Cloud Security

Automating JIT in the cloud is win-win for improving security and business productivity -- and cracks a nut that PAM can’t....


January 6, 2023

Cybersecurity Snapshot: Discover the Most Valuable Cyber Skills, Key Cloud Security Trends and Cyber’s Big Business Impact

Happy New Year! Learn all about the cybersecurity expertise that employers value most; Google Cybersecurity Action Team’s latest take on cloud security trends; a Deloitte report on cybersecurity’s growing business influence; a growth forecast for cyber spending; and more!...


January 5, 2023

CVE-2022-47523: ManageEngine Password Manager Pro, PAM360 and Access Manager Plus SQL Injection Vulnerability

Zoho patches a newly disclosed high-severity SQL injection flaw in several ManageEngine products; attackers have historically targeted several ManageEngine products over the last three years....


January 3, 2023

Visibility of the Unknown: Understanding EASM and How It Can Help

External attack surface management (EASM) is difficult and oftentimes confusing, especially in a world of poor inventory controls and a growing attack surface. This blog discusses what's required to do EASM successfully....


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >