Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

March 31, 2026

Supply chain attack on Axios npm package: Scope, impact, and remediations

The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft, including the loss of credentials and API keys. Scan your environment now.

July 28, 2025

Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market

Tenable customers have spoken: Here’s what they’re saying about our products.


July 28, 2025

The Keys to Implementing Exposure Management

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on hesitations around exposure management.


July 25, 2025

Cybersecurity Snapshot: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan

Check out the latest on attackers’ cyber siege of SharePoint servers. Plus, the White House releases plan to spur AI innovation. In addition, CISA alerts orgs about Interlock ransomware. And get the latest on Q2's top malware; ransomware trends; and credentialed scanning.


July 24, 2025

Un'attenzione più mirata: miglioramenti al VPR Tenable e confronto con altri modelli di prioritizzazione

Tenable sta rilasciando una serie di miglioramenti al Vulnerability Priority Rating (VPR), tra cui il potenziamento dell'intelligence sulle minacce, informazioni e spiegazioni guidati dall'intelligenza artificiale e metadati contestuali. Learn how the improved prioritization effectiveness of the enhanced VPR compares to other common…


July 23, 2025

Tackling Shadow AI in Cloud Workloads

As enterprise adoption of cloud AI systems balloons, protecting them has become a priority. Shadow AI – the unsanctioned use of AI apps – has emerged as a particularly critical threat. Here we outline two best practices that can help you combat shadow AI in your cloud workloads.


July 21, 2025

Forrester nomina Tenable azienda leader nel report Q3 2025 Unified Vulnerability Management Solutions Wave™

“Tenable continues to extend its established vulnerability management offerings into exposure management with its Tenable One platform,” according to the report.


July 21, 2025

How Exposure Management Can Turn a Torrent of Data into Insight

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on the greatest cybersecurity challenges.


July 20, 2025

CVE-2025-53770: Frequently Asked Questions About Zero-Day SharePoint Vulnerability Exploitation

Successful exploitation of CVE-2025-53770 could expose MachineKey configuration details from a vulnerable SharePoint Server, ultimately enabling unauthenticated remote code execution.


July 18, 2025

CVE-2025-54309: CrushFTP Zero-Day Vulnerability Exploited In The Wild

A critical zero-day flaw in CrushFTP that can grant attackers administrator access was discovered on July 18 and is under active exploitation.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.