- Nessus Patch Management Integration Now Supports IBM Tivoli Endpoint Manager
- Video: #1 Nessus is an Enterprise Tool - Top Ten Things You Didn't Know About Nessus
- Video: Analyzing Nessus Virus Detections with the Log Correlation Engine
- Analyzing Nessus Detected Malicious Processes Activity with the Log Correlation Engine
- We're hiring! - Visit the Tenable website for more information about open positions.
- Check out our video channel on YouTube which contains new Nessus and SecurityCenter 4 tutorials.
- Tenable Tweets - You can find us on Twitter at http://twitter.com/tenablesecurity where we make product and company announcements, provide Nessus plugin statistics, and more!
- Want to ask questions about Nessus, SecurityCenter, LCE, and PVS and get answers from the experts at Tenable? Join Tenable's Discussion Forum for custom scripts, announcements, and more!
- You can subscribe to the Tenable Network Security Podcast on iTunes!
New & Notable Plugins
- MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution
- MS12-065: Vulnerability in Microsoft Works Could Allow Remote Code Execution
- MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege
- MS12-067: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution
- MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege
- MS12-069: Vulnerability in Kerberos Could Allow Denial of Service
- MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege
- MS KB2661254: Update For Minimum Certificate Key Length
- Adobe AIR 3.x <= 22.214.171.1240 Vulnerabilities
- Flash Player <= 10.3.183.23 / 11.4.402.278 Vulnerabilities
- Wireshark 1.8.x < 1.8.3 Vulnerabilities
- Windows Phone7 < 7.10.8107 Out-of-Date SSL Certificate Blacklist
Passive Vulnerability Scanner
Nessus ProfessionalFeed and SecurityCenter customers can download compliance checks from the Tenable Support Portal.
- New CIS Apache Web Server 2.2 Audit Policies
- New CIS Solaris 11 Audit Policy
- Tenable Audit Policies - CIS Unix and Linux
- Former LulzSec member pleads guilty to conspiracy in Sony Pictures hack - Guilty plea, likely because their leader, Sabu, acted as an informant for the FBI. Tough to win a case when the leader of your group is a rat. LulzSec seems to be no more, wonder what the name of the next hacking group will be...
- Rise In U.S. Hacker Attacks Against China - I want to know how you tell where the attacks are really originating from. With proxy servers and smarter malware, the origin of attack is sometimes a closely-guarded secret, unless you don't care about being caught, which means you're not doing anything anyone cares about.
- Security Monitoring An Elixir For Intrusion Costs? - This article talks about intelligence gathering, but spinning it around and learning more about the attackers. I often wonder how valuable this information is to your defenses.
- Master Keys - Apparently, it's pretty easy to make a key based on a picture, which in this case would be bad, very, very bad.
- Never Attribute to Malice, but Always Verify - I'm at odds with this statement: "Decisions on IT purchases or boycotts should be made on facts. Organizations should test technology for vulnerabilities and backdoors, which I would argue are just intentional vulnerabilities. If it passes the test, make the purchase." Is it up to you as the consumer to test stuff going on your network? If so, what level of testing? Shouldn't the vendor test their own stuff? When I buy a new car, I expect that everything works. Do I have to hire a mechanic to run through a brand-new car to make sure it's safe?
- Majority of SMBs Have No Security Policies or Contingency Plans - Educating small businesses needs to be an ongoing effort, and there needs to be more work done to create programs that will allow them to be more secure. Outsourcing is all most SMBs have in terms of a fighting chance for security.
- Security Manager's Journal: I hired a hacker - Hrm, sounds like some further planning could have made this an even better test. Scanning your external IP address space with Nessus would have likely uncovered the DNS problems, some application security may have uncovered SQL injection, two-factor authentication helps, and an end-user awareness training program will do you good. But, if you don't know where the gaps are, how do you plug them?
- Apple's Combined Patching - I don't like how Apple patches 197 security vulnerabilities and forces you to upgrade to the latest OS, which changes functionality such as maps and podcasts.