Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Podcast Episode 164 - "Detecting Portable Devices, Losing Private Keys"

Welcome to the Tenable Network Security Podcast Episode 164


New & Notable Plugins


Passive Vulnerability Scanner

Vulnerability Detection

General Detection

From the plugin description: Financial Information eXchange (FIX) protocol. The remote client is running a FIX application. This protocol is used by financial institutions to exchange data. The FIX protocol has very few built-in security controls and, instead, relies on industry standard encryption (PGP, SSL/TLS, etc.) to protect the stream. The PVS has just observed this client initiate a LOGON request without encryption set.

SecurityCenter Report Templates

  • Exploits By Platform - Traces the exploitability of vulnerabilities in your environment using the three most popular exploit frameworks


  1. AMI Firmware Source Code, Private Key Leaked | threatpost
  2. Command Injection Tips: Leveraging Command-line Kung Fu with nslookup
  3. Bitcoin-mining malware enslaves computers
  4. Veracode Predicts Rise of "Everyday Hacker"
  5. Parking Ticket Firm Exposes Private Information
  6. Fake Twitter Followers Becomes Multimillion Dollar Business

Subscribe to the Tenable Blog