Tenable blog
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Identifying XML External Entity: How Tenable.io Web Application Scanning Can Help
XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help....
CVE-2022-27511, CVE-2022-27512: Patches for Two Citrix Application Delivery Management Vulnerabilities
Citrix patches a “nasty bug” in its Application Delivery Management solution that is difficult to exploit....
Cybersecurity Snapshot: 6 Things That Matter Right Now
Key vulnerabilities you can’t ignore. Best practices to improve operational technology (OT) cybersecurity. A reality check on shift left, DevSecOps and cloud security. Tackling the security skills gap. Healthcare data breaches. And much more!...
Tenable Capture the Flag 2022: The Results Are In!
It’s time to crown the winners of this year’s Capture the Flag Event! This event presented a series of security-related challenges in a Jeopardy-style format. Challenges ranged in difficulty and topics including Web App, Reverse Engineering, Crypto, Stego, OSINT, Forensics, Code and more. Ther...
Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190)
Microsoft addresses 55 CVEs in its June 2022 Patch Tuesday release, including three critical flaws....
Microsoft Azure Synapse Pwnalytics
Since March 10, Tenable Research has attempted to work with Microsoft to address two serious flaws in the underlying infrastructure of Azure Synapse Analytics....
Everybody Does Good Vulnerability Management When S#*t Hits the Fan
Ever notice how security teams operate more efficiently during a crisis? You need to take the same approach to security all the time. To help you get started, here are four best practices — and a new Tenable.io feature. ...
AWS, Azure and GCP: The Ultimate IAM Comparison
AWS vs. Azure vs. GCP — how do these cloud providers compare when it comes to IAM? Read on to find out....
So Many CVEs, So Little Time: Zero In and ‘Zero Click’ into the Current Vulnerability Landscape
Among the thousands of vulnerabilities disclosed so far in 2022, we highlight five and explain why they matter....