Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

December 3, 2025

CVE-2025-55182: Frequently Asked Questions About React2Shell: React Server Components Remote Code Execution Vulnerability

A maximum severity vulnerability (CVSS 10) was discovered in React, one of the most popular JavaScript frameworks. If your app supports React Server Components, you are likely vulnerable out of the box, even if you aren’t using Server Functions explicitly. Patch immediately.

November 10, 2025

Tenable è leader nel primo Gartner® Magic Quadrant™ for Exposure Assessment Platforms

I nostri clienti dimostrano cosa è in grado di fare la gestione dell'esposizione. Li ringraziamo per averci scelto come parte della loro missione.


November 7, 2025

Cybersecurity Snapshot: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework

Learn why Google expects AI to transform cyber defense and offense next year, and explore MITRE's major update to the ATT&CK knowledge base. We also cover a new McKinsey playbook for agentic AI security, along with the latest on Microsoft Exchange protection and the CIS Benchmarks.


November 6, 2025

What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation

We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.


November 6, 2025

Why Security and IT Disagree on Patching (and Why That's a Good Thing)

Let's be frank, for most organizations, patching is a mess. It's the flashpoint where two of the most critical departments in the company, security and IT, seem to be working against each other.


November 5, 2025

7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution

Not all exposure management platforms are created equal. But how can you pick the right one for your organization? Here’s a set of questions designed to help you cut through vendor noise and make an informed decision.


November 5, 2025

HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage

Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.


November 4, 2025

Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security

Discover how the latest NERC CIP standard for Internal Network Security Monitoring (INSM) shifts the focus inside your network, and how Tenable can help deliver the comprehensive visibility required to achieve compliance and enhance security.


October 31, 2025

Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness

Many organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks.


October 30, 2025

Ridurre al minimo il raggio di azione delle vulnerabilità nel cloud

Tenable Cloud Security unifica la visibilità nel codice, nella build e nelle fasi del runtime. Mette in relazione vulnerabilità, identità e configurazioni errate per stabilire le priorità di sfruttabilità e automatizzare il contenimento, aiutando i team a rilevare, controllare e correggere i rischi in ambienti ibridi e multi-cloud.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.

Uno sguardo all'interno dell'ecosistema dei ransomware

Scarica il report >

× Contatta il team di vendita