Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Cerca Risorsa - BlogRisorsa - WebinarRisorsa - ReportRisorsa - Eventoicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.

Get the latest Tenable news

From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.

Iscriviti

Comunicati stampa

Columbia, MD

Tenable Named a Major Player in Inaugural IDC MarketScape for Worldwide Cloud-Native Application Protection Platforms

Columbia, MD

Tenable Research Finds Pervasive Cloud Misconfigurations Exposing Critical Data and Secrets

Columbia, MD

Tenable Recognized for AI Leadership with Globee Award for AI-Powered Security

London, UK

Tenable Appoints Ross Baker As Senior Director, Sales of UK, Ireland and Africa

Columbia, MD

Tenable Announces Intent to Acquire Apex Security to Expand Exposure Management Across the AI Attack Surface

Columbia, MD

Tenable Reveals 2025 Global Partner Award Winners


One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers

The Register

One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.

According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.

Zero-day vulnerability in SonicWall SMA series under attack

TechTarget

SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
 

While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.

"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."

The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100

CRN

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

China's cyber intrusions took a sinister turn in 2024

The Register

"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.

 

Russian Hackers Target Mozilla, Windows in New Exploit Chain

Data Breach Today

Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset.

Satnam Narang, senior research engineer at Tenable, said the attack underscores both the persistence of threat actors and the increasing difficulty of breaching browser defenses.

"With the adoption of sandbox technology in modern browsers, threat actors need to do more than just exploit a browser vulnerability alone," Narang said in a statement. "By combining a browser-based exploit along with a privilege escalation flaw, the RomCom threat actor was able to bypass the Firefox sandbox."

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

What Will The NIS2 Directive Mean For Smaller Organisations?

Cyber Security Intelligence

In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline

How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable

Techopedia

In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.

Scammers Litter Dating Apps With AI-Generated Profile Pics

Bloomberg

Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."

Exclusive Feature: Data Privacy

Tahawultech News

Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.

Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately

IT Pro

Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.

The Innovator – Gavin Millard

Security Buyer

Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.

"Tenable One is the first brick of a greater whole"

Journal Du Net
Interview with Bernard Montel discussing Tenable One and Tenable's Reseach Alliance.

Glen Pendley discusses Exposure Management

TickerTV

EDF: can cyberattacks worsen the energy crisis this winter?

La Tribune
Bernard Montel is quoted as a cybersecurity expert in this report by La Tribune discussing the impact cyberattacks could have during this winter's energy crisis.

Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援

ZDNet Japan

Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity

TickerTV
Nathan Wenzler, Chief Security Officer at Tenable discusses the impact of the great reshuffling on cybersecurity.

Glen Pendley on transparency from cloud infrastructure providers

TickerTV
Glen Pendley on transparency from cloud infrastructure providers.

Addressing SolarWinds Through Executive Action: A Welcomed And Critical Advancement

Forbes
Amit Yoran shared his reaction to President Biden's much anticipated cyber Executive Order.

Biden Signs Executive Order to Bolster Federal Government’s Cybersecurity

The New York Times
Amit Yoran tells The New York Times that the new cybersecurity executive order is a step in the right direction toward shoring up the nation's security posture.

Lack of cyber funds in Biden infrastructure plan raises eyebrows

The Hill
Marty Edwards explains the importance of cybersecurity funding as part of President Biden's infrastructure plan.

Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations

The Daily Swig
Security experts, including Adam Palmer, react to EU's data breach notification guidelines.

The Future Of Cybersecurity Law Hinges On The Supreme Court

Forbes
Amit Yoran discusses the impending US Supreme Court case discussing the Computer Fraud and Abuse Act.

Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good?

Forbes
Amit Yoran shares his support for legislation to establish a National Cyber Director position and delves into what a person in the role should coordinate and oversee.

The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100

CRN

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

China's cyber intrusions took a sinister turn in 2024

The Register

"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.

 

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

Most widely exploited vulnerabilities in 2023 were zero days

TechTarget

While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.

Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.

Russia's APT29 Mimics AWS Domains to Steal Windows Credentials

Dark Reading

Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.

"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."

 

That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."

Dependency Confusion Could Have Led to RCE in Google Cloud Platform

SecurityWeek

Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.

Organisations must shore up cybersecurity strategies to support remote work: Survey

The Economic Times of India
Kartik Shahani speaks to The Economic Times of India about what organizations in India need to do to secure their remote workforce.

Australians urged to brace for ‘cyber pandemic’

The Australian
Scott McKinnel, country manager for Tenable ANZ speaks to The Australian about what the new world of work looks like along with the impending cyber risks.

Scott McKinnel discusses industry study findings with TickerTV Australia

TickerTV Australia

Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files

The Daily Swig
A Tenable Research discovered vulnerability in Microsoft Teams could allow a malicious actor to steal sensitive data and access a victim’s communications.

Microsoft Teams security flaw left users defenseless against serious cyberattacks

Tech Radar Pro
A simple vulnerability in collaboration platform Microsoft Teams, discovered by Tenable Reasearch, could have given attackers the keys to the kingdom.

Crypto fraudsters used Elon Musk's SNL appearance 'to fleece people of up to $10million in new Twitter scam'

Daily Mail
Satnam Narang looks at the crypto scams following Elon Musk's appearance on Saturday Night Live.

Cyberattacks breaching defences on massive scale

Computing Security

In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.

Ivanti confirms the exploitation of two new vulnerabilities

Le Mag IT

Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.

Prevention is better than cure when it comes to cybersecurity

Just Auto

In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.

Patch Tuesday December 2023

IT Pro

Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.

Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences

Tahawultech News

A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.

Adopting Proactive Cybersecurity in Healthcare

The Journal of mHealth

In an opinion piece EMEA Technical Director and Security Strategist, Bernard Montel, outlines how hospitals and healthcare professionals can take action to understand the risks faced and address challenges to reduce the volume of successful cyberattacks they have to respond to.


Media contacts

Corporate Public Relations [email protected]
(443) 545-2102 ext. 1544
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Mission North
[email protected]
(415) 503-1818
UK
Flame PR
[email protected]
+44 20 3357 9740
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Media Kit

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets

× Contatta il team di vendita