Media room
Tenable news, announcements and global media coverage
Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.
Get the latest Tenable news
From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.
Comunicati stampa
Tenable Named a Major Player in Inaugural IDC MarketScape for Worldwide Cloud-Native Application Protection Platforms
Tenable Research Finds Pervasive Cloud Misconfigurations Exposing Critical Data and Secrets
Tenable Recognized for AI Leadership with Globee Award for AI-Powered Security
Tenable Appoints Ross Baker As Senior Director, Sales of UK, Ireland and Africa
Tenable Announces Intent to Acquire Apex Security to Expand Exposure Management Across the AI Attack Surface
One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers
One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.
According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.
- Cyber Breaches
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
China's cyber intrusions took a sinister turn in 2024
"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Russian Hackers Target Mozilla, Windows in New Exploit Chain
Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset.
Satnam Narang, senior research engineer at Tenable, said the attack underscores both the persistence of threat actors and the increasing difficulty of breaching browser defenses.
"With the adoption of sandbox technology in modern browsers, threat actors need to do more than just exploit a browser vulnerability alone," Narang said in a statement. "By combining a browser-based exploit along with a privilege escalation flaw, the RomCom threat actor was able to bypass the Firefox sandbox."
- Cyber Breaches
Apple warns 2 macOS zero-day vulnerabilities under attack
The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
Techopedia •In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Scammers Litter Dating Apps With AI-Generated Profile Pics
Bloomberg •Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."
- Business
- Cybersecurity
Exclusive Feature: Data Privacy
Tahawultech News •Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately
IT Pro •Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.
- Business
- Cybersecurity
- Vulnerability Management
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
"Tenable One is the first brick of a greater whole"
Journal Du Net •- Business
- Corporate News
- Cybersecurity
EDF: can cyberattacks worsen the energy crisis this winter?
La Tribune •- Business
- Corporate News
- Cybersecurity
- Energy
Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援
ZDNet Japan •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Glen Pendley on transparency from cloud infrastructure providers
TickerTV •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Addressing SolarWinds Through Executive Action: A Welcomed And Critical Advancement
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Biden Signs Executive Order to Bolster Federal Government’s Cybersecurity
The New York Times •- Cyber Breaches
- Cyber Policy
Lack of cyber funds in Biden infrastructure plan raises eyebrows
The Hill •- Cyber Policy
Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations
The Daily Swig •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
The Future Of Cybersecurity Law Hinges On The Supreme Court
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
- Vulnerability Management
Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good?
Forbes •- Cyber Policy
- Government
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
CRN •Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
China's cyber intrusions took a sinister turn in 2024
The Register •"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Apple warns 2 macOS zero-day vulnerabilities under attack
TechTarget •The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
Most widely exploited vulnerabilities in 2023 were zero days
TechTarget •While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.
Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.
- Cybersecurity
Russia's APT29 Mimics AWS Domains to Steal Windows Credentials
Dark Reading •Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.
"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."
That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."
- Cyber Breaches
- Cybersecurity
Dependency Confusion Could Have Led to RCE in Google Cloud Platform
SecurityWeek •Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.
- Cybersecurity
Organisations must shore up cybersecurity strategies to support remote work: Survey
The Economic Times of India •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Australians urged to brace for ‘cyber pandemic’
The Australian •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Scott McKinnel discusses industry study findings with TickerTV Australia
TickerTV Australia •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files
The Daily Swig •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Microsoft Teams security flaw left users defenseless against serious cyberattacks
Tech Radar Pro •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Crypto fraudsters used Elon Musk's SNL appearance 'to fleece people of up to $10million in new Twitter scam'
Daily Mail •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Patch Tuesday December 2023
IT Pro •Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.
- Business
- Cybersecurity
- Vulnerability Management
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Tahawultech News •A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Adopting Proactive Cybersecurity in Healthcare
The Journal of mHealth •In an opinion piece EMEA Technical Director and Security Strategist, Bernard Montel, outlines how hospitals and healthcare professionals can take action to understand the risks faced and address challenges to reduce the volume of successful cyberattacks they have to respond to.
- Cybersecurity
- Vulnerability Management
Media contacts
Media Kit
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.