CVE-2025-54987、CVE-2025-54948: Trend Micro Apex One におけるコマンドインジェクションゼロデイ脆弱性の悪用が確認される
Trend Micro releases a temporary mitigation tool to reduce exposure to two unpatched zero-day command injection vulnerabilities which have been exploited....
今すぐ行動しましょう: SLTT 向け 2025 年サイバーセキュリティ助成金 1 億ドルが 8 月 15 日まで利用可能
With over $100 million on the table in FY25 cybersecurity grants, state, local and tribal governments have until August 15, 2025 to apply to secure critical cyber funding to strengthen their defenses....
AI セキュリティのジレンマ: クラウド AI のハイステークスな世界をナビゲートする
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.Artificial Intelligence is no longer on the horizon; it's here, and it's being built and deployed ...
Tenable AI Exposure のご紹介: 憶測に頼らずに AI アタックサーフェスのセキュリティを確保
Now available in Tenable One, Tenable AI Exposure gives you visibility into how your teams use AI platforms and where that usage could put your data, users and defenses at risk....
CVE-2025-54135、CVE-2025-54136: Cursor IDE (CurXecute および MCPoison) の脆弱性に関するよくある質問
Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems....
SonicWall Gen 7 ファイアウォールを標的としたランサムウェア攻撃に関するよくある質問
An increase in ransomware activity tied to SonicWall Gen 7 Firewalls has been observed, possibly linked to the exploitation of a zero-day vulnerability in its SSL VPN....
ホワイトハウスの AI アクションプラン: 未来を守るための重要な機会
AI without built-in cybersecurity remains a liability. The AI Action Plan presents a pivotal opportunity to get this right by emphasizing a secure-by-design approach....
サイバーセキュリティでは協力が不可欠
The future of cybersecurity depends on open, collaborative platforms that bring the industry's best solutions together....
エクスポージャー管理により脆弱性スキャンから統合されたリスクビューに移行する
毎週月曜日、Tenable のサイバーエクスポージャー管理アカデミーでは、脆弱性管理からサイバーエクスポージャー管理への移行に必要な、実用的で現実的なガイダンスを提供しています。 In this post, we look at the results of a survey taken during a recent Tenable webinar on the level of familiarity with exposure ma...
サイバーセキュリティニュース: AI セキュリティは AI の活用に遅れを取り、データが危険にさらされているとIBM が警告。OWASP はエージェント型 AI アプリのセキュリティに取り組む
Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; contain...
Tenable のリスクベース脆弱性管理をオーストラリアサイバーセキュリティセンターの Essential Eight に適用
Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats....
アイデンティティは新たな境界: IdP だけでは不十分
In a cloud-first world, identity is one of the most critical layers of security. While organizations are making progress using IdPs, major identity protection gaps remain....