Tenable ブログ
CVE-2025-54135, CVE-2025-54136: Frequently Asked Questions About Vulnerabilities in Cursor IDE (CurXecute and MCPoison)

CISO の間で統合型サイバーセキュリティ プラットフォームへの移行が高まる
New ESG and ISSA study shows nearly half of organizations are shifting towards integrated cybersecurity platforms. Here’s why many CISOs are making the shift. Less complexity, more security. The shift to integrated cybersecurity platforms has become a growing trend among CISOs. With security t...
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Sept. 23 | A digital trust disconnect between theory and practice | Don’t ignore attack surface management | An SBOM 101 | Report finds hackers targeting small businesses | And much more!...
Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident
Upon hearing of a cybersecurity incident, alleged or factual, the most productive thing to do is learn what you can from its main lessons....
国や地方のサイバーセキュリティ強化のための政府からの 10 億ドルの補助金プログラムの申請受付が始まる
As threats continue to evolve, state and local governments benefit from federal grant funding to bolster their cybersecurity posture....
アタックサーフェス全体で「知らないことすらわからないもの」をやっと発見
CISO の最大の悩みは「知らないことすらわからない」資産や脆弱性、設定ミス、システムの弱点などセキュリティ部門が未だ検知せず安全を確保できていないものです。These blind spots represent a golden opportunity for attackers – and a major security risk for organizations....
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity | Guides to help developers beef up on security | And much more!...
AA22-257A: サイバーセキュリティ機関、イランのイスラム革命防衛隊関連の攻撃に関する勧告を共同で発行
Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks....
CVE-2022-40139: Trend Micro Apex One における脆弱性の悪用が確認される
Trend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been exploited in the wild....
IDSA Introduces CIEM Best Practices
The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management....