Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

April 16, 2026

Beating the Mythos clock: Using Tenable Hexa AI custom agents for automated patching

See how Tenable Hexa AI custom agents empower you to counter machine-speed threats by automating vulnerability remediation. Learn how the Model Context Protocol (MCP) automates execution of risk-driven patching workflows, shifting your strategy from reactive tracking to continuous exposure management.

February 25, 2026

CVE-2026-20127: Cisco Catalyst SD-WAN Controller/Manager Zero-Day Authentication Bypass Vulnerability Exploited in the Wild

Exploitation of a maximum severity authentication bypass zero-day vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager has been reported. Immediate patching is recommended to thwart ongoing attacks.


February 24, 2026

New Malicious npm Package "ambar-src" Targets Developers with Open Source Malware

Tenable Research investigated a malicious npm package with around 50,000 downloads in the public registry. We observed various detection-evasion techniques and saw it deploy multiple powerful open-source malware variants.


February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.


19 febbraio 2026

La trappola della velocità del cloud e dell'IA: perché la governance è in ritardo rispetto all'innovazione

L'adozione dell'IA sta superando la tradizionale governance informatica. Il "Tenable Cloud and AI Security Risk Report 2026" rivela come identità con privilegi eccessivi e dipendenze della catena di approvvigionamento non monitorate lascino le organizzazioni esposte. Proponiamo 10 tattiche per bloccare i percorsi di attacco più critici.


February 12, 2026

Gartner® nomina Tenable l’attuale "Company to Beat" (azienda da battere) per la valutazione dell’esposizione basata sull’IA in un report del 2025.

"Grazie alla copertura degli asset e della superficie di attacco, all'applicazione dell'IA e alla sua reputazione per la valutazione delle vulnerabilità, Tenable è l'azienda leader nella valutazione dell'esposizione basata sull'IA", scrive Gartner nel report "AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment".


February 10, 2026

Microsoft’s February 2026 Patch Tuesday Addresses 54 CVEs (CVE-2026-21510, CVE-2026-21513)

Microsoft addresses 54 CVEs in the February 2026 Patch Tuesday released, including six zero-day vulnerabilities that were exploited in the wild and three publicly disclosed CVEs.


February 9, 2026

What Anthropic’s Latest Model Reveals About the Future of Cybersecurity

AI can find vulnerabilities with unprecedented speed, but discovery alone doesn’t reduce cyber risk. We need exposure prioritization, contextual risk analysis, and AI-driven remediation to transform findings into security outcomes.


February 9, 2026

I pretended to be an AI agent on Moltbook so you don’t have to

I went undercover on Moltbook, the AI-only social network, masquerading as a bot. Instead of deep bot-to-bot conversations, I found spam, scams, and serious security risks.


February 5, 2026

2025 SLG cyber trends: 5 lessons to build a 2026 cyber roadmap

From school districts to state agencies, 2025 cyber incidents were a wake-up call about asset visibility. Discover five actionable lessons SLG leaders can use to close the cyber exposure gap and move from reactive threat detection and response to proactive exposure management.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.