Media room
Tenable news, announcements and global media coverage
Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.
Get the latest Tenable news
From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.
Press releases
Tenable Research Reveals Popular AI Tools Used in Cloud Environments are Highly Vulnerable
Tenable Strengthens Its Identity Exposure Capabilities to Protect Against Compromises
Tenable Plans to Acquire Vulcan Cyber, Accelerate Leadership in Exposure Management
China's cyber intrusions took a sinister turn in 2024
"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Russian Hackers Target Mozilla, Windows in New Exploit Chain
Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset.
Satnam Narang, senior research engineer at Tenable, said the attack underscores both the persistence of threat actors and the increasing difficulty of breaching browser defenses.
"With the adoption of sandbox technology in modern browsers, threat actors need to do more than just exploit a browser vulnerability alone," Narang said in a statement. "By combining a browser-based exploit along with a privilege escalation flaw, the RomCom threat actor was able to bypass the Firefox sandbox."
- Cyber Breaches
Apple warns 2 macOS zero-day vulnerabilities under attack
The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
Most widely exploited vulnerabilities in 2023 were zero days
While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.
Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.
- Cybersecurity
Russia's APT29 Mimics AWS Domains to Steal Windows Credentials
Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.
"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."
That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."
- Cyber Breaches
- Cybersecurity
Tenable integrates DSPM, AI-DSPM to cloud security platform
Exposure management provider Tenable has introduced new data security posture management and artificial intelligence security posture management capabilities to its Tenable Cloud Security platform. The updates, available to Tenable Cloud Security and Tenable One customers, address the increasing complexity of cloud environments, which often face risks from misconfigurations, overexposed workloads, and excessive privileges. Tenable Research identified that 38% of organizations struggle with a "toxic cloud triad" -- a combination of exposed, vulnerable, and highly privileged cloud workloads.
- Business
Scammers Litter Dating Apps With AI-Generated Profile Pics
Bloomberg •Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."
- Business
- Cybersecurity
Exclusive Feature: Data Privacy
Tahawultech News •Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately
IT Pro •Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.
- Business
- Cybersecurity
- Vulnerability Management
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation
Security Week •A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.
- Business
- Cybersecurity
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
"Tenable One is the first brick of a greater whole"
Journal Du Net •- Business
- Corporate News
- Cybersecurity
EDF: can cyberattacks worsen the energy crisis this winter?
La Tribune •- Business
- Corporate News
- Cybersecurity
- Energy
Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援
ZDNet Japan •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Glen Pendley on transparency from cloud infrastructure providers
TickerTV •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Addressing SolarWinds Through Executive Action: A Welcomed And Critical Advancement
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Biden Signs Executive Order to Bolster Federal Government’s Cybersecurity
The New York Times •- Cyber Breaches
- Cyber Policy
Lack of cyber funds in Biden infrastructure plan raises eyebrows
The Hill •- Cyber Policy
Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations
The Daily Swig •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
The Future Of Cybersecurity Law Hinges On The Supreme Court
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
- Vulnerability Management
Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good?
Forbes •- Cyber Policy
- Government
Most widely exploited vulnerabilities in 2023 were zero days
TechTarget •While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.
Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.
- Cybersecurity
Russia's APT29 Mimics AWS Domains to Steal Windows Credentials
Dark Reading •Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.
"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."
That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."
- Cyber Breaches
- Cybersecurity
Dependency Confusion Could Have Led to RCE in Google Cloud Platform
SecurityWeek •Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.
- Cybersecurity
IoT Unplugged – S3:E7 – Establishing priorities for Cloud security
IoT Insider •In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Apple sends out iPhone spyware warnings in 92 countries: What you need to know
The National •Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Organisations must shore up cybersecurity strategies to support remote work: Survey
The Economic Times of India •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Australians urged to brace for ‘cyber pandemic’
The Australian •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Scott McKinnel discusses industry study findings with TickerTV Australia
TickerTV Australia •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files
The Daily Swig •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Microsoft Teams security flaw left users defenseless against serious cyberattacks
Tech Radar Pro •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Crypto fraudsters used Elon Musk's SNL appearance 'to fleece people of up to $10million in new Twitter scam'
Daily Mail •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Patch Tuesday December 2023
IT Pro •Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.
- Business
- Cybersecurity
- Vulnerability Management
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Tahawultech News •A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Adopting Proactive Cybersecurity in Healthcare
The Journal of mHealth •In an opinion piece EMEA Technical Director and Security Strategist, Bernard Montel, outlines how hospitals and healthcare professionals can take action to understand the risks faced and address challenges to reduce the volume of successful cyberattacks they have to respond to.
- Cybersecurity
- Vulnerability Management
Media contacts
Media kit
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.