Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.

Get the latest Tenable news

From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.

Subscribe

Press releases

Columbia, MD

Tenable Research Reveals Popular AI Tools Used in Cloud Environments are Highly Vulnerable

Columbia, MD

Tenable Strengthens Its Identity Exposure Capabilities to Protect Against Compromises

Columbia, MD

Tenable Completes Acquisition of Vulcan Cyber

Columbia, MD

Tenable Plans to Acquire Vulcan Cyber, Accelerate Leadership in Exposure Management

Columbia, MD

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

Columbia, MD

Tenable Announces the Passing of Chairman and CEO Amit Yoran


China's cyber intrusions took a sinister turn in 2024

The Register

"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.

 

Russian Hackers Target Mozilla, Windows in New Exploit Chain

Data Breach Today

Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset.

Satnam Narang, senior research engineer at Tenable, said the attack underscores both the persistence of threat actors and the increasing difficulty of breaching browser defenses.

"With the adoption of sandbox technology in modern browsers, threat actors need to do more than just exploit a browser vulnerability alone," Narang said in a statement. "By combining a browser-based exploit along with a privilege escalation flaw, the RomCom threat actor was able to bypass the Firefox sandbox."

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

Most widely exploited vulnerabilities in 2023 were zero days

TechTarget

While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.

Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.

Russia's APT29 Mimics AWS Domains to Steal Windows Credentials

Dark Reading

Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.

"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."

 

That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."

Tenable integrates DSPM, AI-DSPM to cloud security platform

SC Media

Exposure management provider Tenable has introduced new data security posture management and artificial intelligence security posture management capabilities to its Tenable Cloud Security platform. The updates, available to Tenable Cloud Security and Tenable One customers, address the increasing complexity of cloud environments, which often face risks from misconfigurations, overexposed workloads, and excessive privileges. Tenable Research identified that 38% of organizations struggle with a "toxic cloud triad" -- a combination of exposed, vulnerable, and highly privileged cloud workloads.

 

Scammers Litter Dating Apps With AI-Generated Profile Pics

Bloomberg

Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."

Exclusive Feature: Data Privacy

Tahawultech News

Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.

Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately

IT Pro

Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.

The Innovator – Gavin Millard

Security Buyer

Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.

Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation

Security Week

A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.

We shall not be moved!

Computing Security

In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.

"Tenable One is the first brick of a greater whole"

Journal Du Net
Interview with Bernard Montel discussing Tenable One and Tenable's Reseach Alliance.

Glen Pendley discusses Exposure Management

TickerTV

EDF: can cyberattacks worsen the energy crisis this winter?

La Tribune
Bernard Montel is quoted as a cybersecurity expert in this report by La Tribune discussing the impact cyberattacks could have during this winter's energy crisis.

Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援

ZDNet Japan

Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity

TickerTV
Nathan Wenzler, Chief Security Officer at Tenable discusses the impact of the great reshuffling on cybersecurity.

Glen Pendley on transparency from cloud infrastructure providers

TickerTV
Glen Pendley on transparency from cloud infrastructure providers.

Addressing SolarWinds Through Executive Action: A Welcomed And Critical Advancement

Forbes
Amit Yoran shared his reaction to President Biden's much anticipated cyber Executive Order.

Biden Signs Executive Order to Bolster Federal Government’s Cybersecurity

The New York Times
Amit Yoran tells The New York Times that the new cybersecurity executive order is a step in the right direction toward shoring up the nation's security posture.

Lack of cyber funds in Biden infrastructure plan raises eyebrows

The Hill
Marty Edwards explains the importance of cybersecurity funding as part of President Biden's infrastructure plan.

Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations

The Daily Swig
Security experts, including Adam Palmer, react to EU's data breach notification guidelines.

The Future Of Cybersecurity Law Hinges On The Supreme Court

Forbes
Amit Yoran discusses the impending US Supreme Court case discussing the Computer Fraud and Abuse Act.

Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good?

Forbes
Amit Yoran shares his support for legislation to establish a National Cyber Director position and delves into what a person in the role should coordinate and oversee.

Most widely exploited vulnerabilities in 2023 were zero days

TechTarget

While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.

Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.

Russia's APT29 Mimics AWS Domains to Steal Windows Credentials

Dark Reading

Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.

"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."

 

That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."

Dependency Confusion Could Have Led to RCE in Google Cloud Platform

SecurityWeek

Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.

IoT Unplugged – S3:E7 – Establishing priorities for Cloud security

IoT Insider

In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums

TickerTV

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.

Apple sends out iPhone spyware warnings in 92 countries: What you need to know

The National

Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.

Organisations must shore up cybersecurity strategies to support remote work: Survey

The Economic Times of India
Kartik Shahani speaks to The Economic Times of India about what organizations in India need to do to secure their remote workforce.

Australians urged to brace for ‘cyber pandemic’

The Australian
Scott McKinnel, country manager for Tenable ANZ speaks to The Australian about what the new world of work looks like along with the impending cyber risks.

Scott McKinnel discusses industry study findings with TickerTV Australia

TickerTV Australia

Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files

The Daily Swig
A Tenable Research discovered vulnerability in Microsoft Teams could allow a malicious actor to steal sensitive data and access a victim’s communications.

Microsoft Teams security flaw left users defenseless against serious cyberattacks

Tech Radar Pro
A simple vulnerability in collaboration platform Microsoft Teams, discovered by Tenable Reasearch, could have given attackers the keys to the kingdom.

Crypto fraudsters used Elon Musk's SNL appearance 'to fleece people of up to $10million in new Twitter scam'

Daily Mail
Satnam Narang looks at the crypto scams following Elon Musk's appearance on Saturday Night Live.

Cyberattacks breaching defences on massive scale

Computing Security

In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.

Ivanti confirms the exploitation of two new vulnerabilities

Le Mag IT

Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.

Prevention is better than cure when it comes to cybersecurity

Just Auto

In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.

Patch Tuesday December 2023

IT Pro

Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.

Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences

Tahawultech News

A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.

Adopting Proactive Cybersecurity in Healthcare

The Journal of mHealth

In an opinion piece EMEA Technical Director and Security Strategist, Bernard Montel, outlines how hospitals and healthcare professionals can take action to understand the risks faced and address challenges to reduce the volume of successful cyberattacks they have to respond to.


Media contacts

Corporate Public Relations [email protected]
(443) 545-2102 ext. 1544
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Mission North
[email protected]
(415) 503-1818
UK
Flame PR
[email protected]
+44 20 3357 9740
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Media kit

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets