Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

March 31, 2026

Supply chain attack on Axios npm package: Scope, impact, and remediations

The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft, including the loss of credentials and API keys. Scan your environment now.

September 30, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical infrastructure from cyberattacks | How to prevent MFA fatigue attacks | “FiGHT” to secure 5G networks | And much more!


September 29, 2022

Diving Deeply into IAM Policy Evaluation: Highlights from AWS re:Inforce IAM433

One of the most talked-about sessions at AWS re:Inforce was IAM433, which discussed AWS IAM’s internal evaluation mechanisms.


September 27, 2022

The shift to integrated cybersecurity platforms: a growing trend among CISOs

New ESG and ISSA study shows nearly half of organizations are shifting towards integrated cybersecurity platforms. Here’s why many CISOs are making the shift. Less complexity, more security. The shift to integrated cybersecurity platforms has become a growing trend among CISOs. With security…


September 23, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending Sept. 23 | A digital trust disconnect between theory and practice | Don’t ignore attack surface management | An SBOM 101 | Report finds hackers targeting small businesses | And much more!


September 22, 2022

Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident

Upon hearing of a cybersecurity incident, alleged or factual, the most productive thing to do is learn what you can from its main lessons.


September 22, 2022

$1 Billion State and Local Cybersecurity Grant Program Now Open for Applicants

As threats continue to evolve, state and local governments benefit from federal grant funding to bolster their cybersecurity posture.


September 20, 2022

Trovare finalmente le "incognite non note" nell'intera superficie di attacco

I CISO temono le cosiddette "incognite non note", vale a dire asset, vulnerabilità, configurazioni errate e punti deboli del sistema che i team di sicurezza non hanno rilevato né pertanto protetto. Questi punti ciechi rappresentano un'occasione d'oro per gli aggressori e un rischio enorme per la sicurezza delle organizzazioni.


September 16, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity | Guides to help developers beef up on security | And much more!


September 15, 2022

AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks

Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.