予期せぬ侵害: 見えないリスクの組み合わせが組織を危険にさらしている
Most breaches don’t happen because of one glaring issue. They happen when multiple, seemingly low-risk factors silently combine. Learn how invisible risk combinations evade siloed security tools and how an exposure management program gives defenders the context they need to stop attacks before they…
Tenable が GPT-5 を「脱獄」し、OpenAI の新しいセキュリティ技術にもかかわらず危険な情報を生成
Within just 24 hours of the release of OpenAI’s GPT-5, Tenable Research successfully managed to jailbreak the model by getting it to share detailed instructions for how to build an explosive. Our finding is concerning, given that OpenAI described GPT-5's prompt safety technology as significantly…
Tenable のセキュリティチーム、エクスポージャー管理により数千件のアラートから数件のチケットへ
毎週月曜日、Tenable のサイバーエクスポージャー管理アカデミーでは、脆弱性管理からサイバーエクスポージャー管理への移行に必要な、実用的で現実的なガイダンスを提供しています。 In this post, Tenable CSO Robert Huber shares how he and his team have guided the company to unified exposure management.
サイバーセキュリティニュース: CISA が SharePoint に対する攻撃で使用されたマルウェアを分析、英国がサイバー評価フレームワークを強化
Check out what CISA found after it dissected malware from the latest SharePoint hacks. Plus, the U.K.’s cyber agency is overhauling its cyber framework to keep pace as threats escalate. In addition, CISA is sounding the alarm on a high-severity vulnerability impacting hybrid Exchange environments…
CVE-2025-53786: Microsoft Exchange Server ハイブリッド展開における特権昇格の脆弱性に関するよくある質問
Frequently asked questions about CVE-2025-53786, an elevation of privilege vulnerability affecting Microsoft Exchange Server Hybrid Deployments.
Tenable、2025 年 IDC MarketScape にて CNAPP における主要プレイヤーとして評価される
"With a strong focus on CNAPP through Tenable Cloud Security and exposure management with Tenable One, Tenable provides visibility and control over hybrid attack surfaces, including on-premises, cloud, and hybrid environments,” according to the report.
CVE-2025-54987、CVE-2025-54948: Trend Micro Apex One におけるコマンドインジェクションゼロデイ脆弱性の悪用が確認される
Trend Micro releases a temporary mitigation tool to reduce exposure to two unpatched zero-day command injection vulnerabilities which have been exploited.
今すぐ行動しましょう: SLTT 向け 2025 年サイバーセキュリティ助成金 1 億ドルが 8 月 15 日まで利用可能
With over $100 million on the table in FY25 cybersecurity grants, state, local and tribal governments have until August 15, 2025 to apply to secure critical cyber funding to strengthen their defenses.
AI セキュリティのジレンマ: クラウド AI のハイステークスな世界をナビゲートする
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.Artificial Intelligence is no longer on the horizon; it's here, and it's being built and deployed…
Tenable AI Exposure のご紹介: 憶測に頼らずに AI アタックサーフェスのセキュリティを確保
Tenable One にこのたび新たに導入された Tenable AI Exposure は、AI プラットフォームがどのように使用されているか、そしてその利用がデータ、ユーザー、防御にどのようなリスクをもたらすかを可視化します。
CVE-2025-54135、CVE-2025-54136: Cursor IDE (CurXecute および MCPoison) の脆弱性に関するよくある質問
Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems.
SonicWall Gen 7 ファイアウォールを標的としたランサムウェア攻撃に関するよくある質問
An increase in ransomware activity tied to SonicWall Gen 7 Firewalls has been observed, possibly linked to the exploitation of a zero-day vulnerability in its SSL VPN.