Tenable ブログ
CVE-2025-54135, CVE-2025-54136: Frequently Asked Questions About Vulnerabilities in Cursor IDE (CurXecute and MCPoison)

中国政府により支援を受けたサイバー攻撃者によって頻繁に悪用されている上位の CVE (AA22-279A)
CISA, the NSA and FBI issue a joint advisory detailing the top 20 vulnerabilities exploited by state-sponsored threat actors linked to the People’s Republic of China....
CVE-2022-40684: FortiOS および FortiProxy における「緊急」の認証バイパスの脆弱性
Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access....
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Not great | New malware cracks monthly top 10 list | And much more!...
Public Network Access to Azure Resources Is Too Easy to Configure
For some types of Microsoft Azure resources and subnets, it’s extremely easy to configure what is essentially public network access. We describe here some examples and how to reduce such risks....
Tenable One サイバーエクスポージャー管理プラットフォームのご紹介
- 起こりうる攻撃を予測して、 事前対応型のエクスポージャー削減を行い、 Communicate with your key stakeholders....
エクスポージャー管理: DX 時代のアタックサーフェスのリスクを削減
サイバーセキュリティ企業にとって、事後対応型でサイロ化したセキュリティ対策や、ほんの少しのインサイトしか得られない断片化されたデータを大量に生成するポイントツールの無秩序な増加は、大きな悩みの種になっています。 Here we explain why they need an exposure management platform that provides comprehensive visibility and allows them to anticipate...
CVE-2022-41040、CVE-2022-41082: ProxyShell の亜種の悪用が確認される
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available....
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical infrastructure from cyberattacks | How to prevent MFA fatigue attacks | “FiGHT” to secure 5G networks | And much more!...
Diving Deeply into IAM Policy Evaluation: Highlights from AWS re:Inforce IAM433
One of the most talked-about sessions at AWS re:Inforce was IAM433, which discussed AWS IAM’s internal evaluation mechanisms....