メディアルーム
Tenable の最新情報と発表、世界の Tenable 関連記事
Tenable のメディアルームにようこそ。 最新発表や報道記事をご覧いただけるページです。世界中のお問い合わせ先情報も掲載しています。メディアキットのダウンロードもここからどうぞ。
プレスリリース
Tenable、Announces Intent to Acquire Apex Security の買収によってエクスポージャー管理を AI アタックサーフェスに拡大する意図を発表
Why firms need ‘exposure management’ to reduce cyber risk for cloud and AI
Interview with Liat Hayun discussing how cloud apps and AI tools create potentially harmful gaps in a company’s security infrastructure.
- Business
- Cybersecurity
- Vulnerability Management
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management
Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.
The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target.
- Corporate News
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers
One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.
According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.
- Cyber Breaches
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
Tenable CEO Amit Yoran on rising cyber threats and state of data security
CNBC Worldwide Exchange •Amit Yoran, CEO of Tenable, discusses the cybersecurity landscape following a recent string of cyberattacks.
- Business
- Cybersecurity
North Texas water utility the latest suspected industrial ransomware target
Cybersecurity Dive •Marty Edwards, deputy CTO for OT/IoT at Tenable, said “These attacks are continued evidence that industrial security is in need of significant improvements, and government regulation at some capacity is necessary to ensure the cyber safety of public services like water and wastewater systems."
- Business
- Cybersecurity
Cybersecurity Challenges in 2023: "The Best Defense is Preventive Security Measures"
DevMio •Chief Cybersecurity Strategist Nathan Wenzler breaksdown the findings from the latest Tenable Report, “Old Habits Die Hard: How People, Process and Technology Challenges Are Hurting Cybersecurity Teams.”
- Business
- Cybersecurity
Make a cyberattack plan and be ready to execute it
Plastics Machinery & Manufacturing •- Business
Tenable CEO Amit Yoran discusses AI and preventive security on CNBC
CNBC •- Business
- Cybersecurity
Tenable CEO accuses Microsoft of negligence in addressing security flaw
CyberScoop •- Business
- Cybersecurity
Beware of the Tinder swindler: How romance scams hit record high of $1.3 billion in 2021
Times of India •- Corporate News
- Cybersecurity
Satnam Narang discusses 2021 Threat Landscape Retrospective
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Healthcare
- Surveys / Research Data
- Vulnerability Management
Cybercriminals gave government departments a run for their money in 2021
The Mandarin •- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Surveys / Research Data
- Vulnerability Management
Scammer use YouTube Shorts for posting stolen videos from TikTok: Report
The Economic Times of India •- Corporate News
- Cybersecurity
- Surveys / Research Data
FTC: Companies Could Face Legal Action for Failing to Patch Log4j
Dark Reading •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Cyber pandemic: Log4j risk is leading to over 100 hacks per minute, 41% corporate networks in India attacked
India Today •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
Privacy Commissioner’s small budget to make policing new data breach laws difficult, experts say
The Sydney Morning Herald •- Cyber Breaches
- Cyber Policy
Data breach reporting laws hit Australia with serious implications for businesses
The Australian •- Business
- Cyber Breaches
- Cyber Policy
Strong encryption is vital to our future in tech
The Hill •- Cyber Policy
- Government
Week ahead: How shutdown impacts cyber world
The Hill •- Cyber Policy
- Cybersecurity
- Government
Fine Time: What GDPR Enforcement Could Look Like
Infosecurity Magazine •- Cyber Breaches
- Cyber Policy
- Cybersecurity
Tenable CEO doesn't think much of the Equifax, Yahoo cyber breach explanations
Washington Business Journal •- Cyber Breaches
- Cyber Policy
Apple warns 2 macOS zero-day vulnerabilities under attack
TechTarget •The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
Most widely exploited vulnerabilities in 2023 were zero days
TechTarget •While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.
Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.
- Cybersecurity
Russia's APT29 Mimics AWS Domains to Steal Windows Credentials
Dark Reading •Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.
"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."
That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."
- Cyber Breaches
- Cybersecurity
Dependency Confusion Could Have Led to RCE in Google Cloud Platform
SecurityWeek •Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.
- Cybersecurity
IoT Unplugged – S3:E7 – Establishing priorities for Cloud security
IoT Insider •In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Study reveals 94% of global organisations suffered one or more business-impacting cyberattacks
Intelligent CISO •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
How hackers took over Facebook accounts to steal $4 million, promote scams
Cyberscoop •- Cybersecurity
- Surveys / Research Data
Vulnerability in WordPress email marketing plugin patched
The Daily Swig •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Scammers find a new target: Teens on TikTok
Digital Trends •- Cybersecurity
- Surveys / Research Data
TikTok scrubs ads promoting diet pills, fake apps after Tenable report
Cyberscoop •- Cybersecurity
- Surveys / Research Data
TikTok ads have pushed scams about apps, diet pills, other products, report says
CNET •- Cybersecurity
- Surveys / Research Data
Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Microsoft fixes two-year-old MSDT vulnerability in August update
Computer Weekly •- Cybersecurity
- Vulnerability Management
Guy March of Tenable lays out the channel angle on Security.
European Reseller •- Cybersecurity
- Vulnerability Management
Nationale Cybersicherheitsstrategie erfordert Cyberhygiene
ZDNet •- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Actively exploited zero-day and four 'critical' vulnerabilities fixed in Microsoft's July Patch Tuesday
IT Pro •- Cybersecurity
- Vulnerability Management
Glen Pendley on transparency from cloud infrastructure providers
TickerTV •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
メディアのお問い合わせ先
メディアキット
Tenable メディアキットのダウンロードはこちらから。会社および製品のロゴと使用に関するガイドライン、経営幹部の顔写真、会社概要資料などがご利用いただけます。