Facebook Google Plus Twitter LinkedIn YouTube RSS メニュー 検索 出典 - ブログ 出典 - ウェビナー出典 - レポート出典 - イベントicons_066 icons_067icons_068icons_069icons_070

メディアルーム

Tenable の最新情報と発表、世界の Tenable 関連記事

Tenable のメディアルームにようこそ。 最新発表や報道記事をご覧いただけるページです。世界中のお問い合わせ先情報も掲載しています。メディアキットのダウンロードもここからどうぞ。

Tenable の最新ニュース配信

新しい機能や製品のリリース、業界の調査報告書、戦略的提携に関する情報、その他の最新の Tenable のニュースと正式発表内容をメールでお届けします。

登録する

プレスリリース

英国、ロンドン

Tenable、ロス・ベイカー (Ross Baker) を 英国、アイルランド、アフリカ地域セールスのシニアディレクターに任命

メリーランド州、コロンビア

Tenable、Announces Intent to Acquire Apex Security の買収によってエクスポージャー管理を AI アタックサーフェスに拡大する意図を発表

メリーランド州、コロンビア

Tenable、2025 Global Partner Award の勝者を発表

メリーランド州、コロンビア

Tenable 、サードパーティのデータコネクタと統合ダッシュボードにより、AI 駆動のサイバーエクスポージャー管理を強化

イスラエル、テルアビブ

Tenable、テルアビブにオペレーションセンターを開設

メリーランド州、コロンビア

Tenable、最高製品責任者 (CPO) にエリック・ドゥアー (Eric Doerr) を任命


Why firms need ‘exposure management’ to reduce cyber risk for cloud and AI

The Guardian

Interview with Liat Hayun discussing how cloud apps and AI tools create potentially harmful gaps in a company’s security infrastructure.

Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition

CNBC Worldwide Exchange

Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars. 
 

Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management

Data Breach Today

Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.

The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target. 

Most online Exchange Servers vulnerable to ProxyLogon still not remediated

SC Media

Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research. 

 

One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers

The Register

One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.

According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.

Zero-day vulnerability in SonicWall SMA series under attack

TechTarget

SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
 

While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.

"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."

Tenable CEO Amit Yoran on rising cyber threats and state of data security

CNBC Worldwide Exchange

Amit Yoran, CEO of Tenable, discusses the cybersecurity landscape following a recent string of cyberattacks.

North Texas water utility the latest suspected industrial ransomware target

Cybersecurity Dive

Marty Edwards, deputy CTO for OT/IoT at Tenable, said “These attacks are continued evidence that industrial security is in need of significant improvements, and government regulation at some capacity is necessary to ensure the cyber safety of public services like water and wastewater systems."

Cybersecurity Challenges in 2023: "The Best Defense is Preventive Security Measures"

DevMio

Chief Cybersecurity Strategist Nathan Wenzler breaksdown the findings from the latest Tenable Report, “Old Habits Die Hard: How People, Process and Technology Challenges Are Hurting Cybersecurity Teams.”

Make a cyberattack plan and be ready to execute it

Plastics Machinery & Manufacturing
All companies need to plan for the possibility of a cyberattack or ransomware attack, said Marty Edwards, deputy chief technology officer at Tenable for OT and IoT.

Tenable CEO Amit Yoran discusses AI and preventive security on CNBC

CNBC
"When you move to platform-based security, like Tenable offers to our customers, you can help address not only traditional vulnerabilities, but you can look at access and entitlements, you can look at cloud security and you can bring multiple disciplines of security to provide more effective security and help customers reduce cost. Understanding your cyber risk and understanding your level of cybersecurity and where you have exposures and addressing those exposures proactively isn't a 'nice to have' in this environment. This is a mandatory requirement (from the SEC). Cyber risk is a critical component of business risk and you have a duty of care to understand it and to manage it very proactively." - Amit Yoran

Tenable CEO accuses Microsoft of negligence in addressing security flaw

CyberScoop
Cybersecurity veteran Amit Yoran says Microsoft has a culture of toxic obfuscation when it comes to addressing security threats.

Beware of the Tinder swindler: How romance scams hit record high of $1.3 billion in 2021

Times of India
Satnam Narang explains how scammers abuse the currency of trust.

Satnam Narang discusses 2021 Threat Landscape Retrospective

TickerTV
Satnam Narang highlights key findings from the 2021 Threat Landscape Retrospective.

Cybercriminals gave government departments a run for their money in 2021

The Mandarin
New data on the number of cyberattacks in 2021 shows that for the Asia Pacific, government departments were targeted the most.

Scammer use YouTube Shorts for posting stolen videos from TikTok: Report

The Economic Times of India
Tenable's Satnam Narang reveals how scammers are stealing existing short-form videos from TikTok and reposting them to YouTube Shorts, racking up millions of views and gaining tens of thousands of subscribers.

FTC: Companies Could Face Legal Action for Failing to Patch Log4j

Dark Reading
Amit Yoran says its 'about time' as the FTC issued a strongly worded statement saying it will use its "... full legal authority to pursue companies that fail to take reasonable steps to protect consumer data from exposure as a result of Log4j, or similar known vulnerabilities in the future."

Cyber pandemic: Log4j risk is leading to over 100 hacks per minute, 41% corporate networks in India attacked

India Today
Tenable's Amit Yoran, says that the discovery of a critical flaw in the Apache Log4j software will be something the world will be talking about for years to come.

Privacy Commissioner’s small budget to make policing new data breach laws difficult, experts say

The Sydney Morning Herald
Bede Hackney tells the Sydney Morning Herald that the real size of Australia's data breach problem will come to light thanks to the NDB scheme.

Data breach reporting laws hit Australia with serious implications for businesses

The Australian
In a byline published in The Australian, Bede Hackney says the data breach notification laws will have a major impact on businesses.

Strong encryption is vital to our future in tech

The Hill
Amit Yoran makes the case against weakened encryption, saying that "back doors" would betray U.S. security and economic interests.

Week ahead: How shutdown impacts cyber world

The Hill
James Hayes explains the impact of the government shutdown on federal cybersecurity.

Fine Time: What GDPR Enforcement Could Look Like

Infosecurity Magazine
Gavin Millard discusses the possible financial impact of GDPR fines.

Tenable CEO doesn't think much of the Equifax, Yahoo cyber breach explanations

Washington Business Journal
Amit Yoran's blunt assessment of major data breaches strikes a cord with a Washington Business Journal reporter.

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

Most widely exploited vulnerabilities in 2023 were zero days

TechTarget

While zero-day exploitation surged throughout 2023, CISA said threat actors continue to exploit known vulnerabilities that were disclosed and patched as far back as 2017.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that the inclusion of vulnerabilities in VPNs and internet-exposed services was a common thread among many of the flaws highlighted in the advisory. Narang added that there's a strong correlation between internet-facing systems that utilize software containing known vulnerabilities and the likelihood of exploitation.

Narang also said CVE-2017-6742 exploitation has been connected to the Russian state-sponsored advanced persistent threat group known as Fancy Bear. The group exploited another vulnerability, tracked as CVE-2023-23397, on CISA's advisory to target Microsoft Exchange accounts.

Russia's APT29 Mimics AWS Domains to Steal Windows Credentials

Dark Reading

Russia's premiere advanced persistent threat group–APT29–has been phishing thousands of targets in militaries, public authorities, and enterprises.

"APT29 embodies the 'persistent' part of 'advanced persistent threat,'" says Satnam Narang, senior staff research engineer at Tenable. "It has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. Its modus operandi is the collection of foreign intelligence, as well as maintaining persistence in compromised organizations in order to conduct future operations."

 

That APT29 would go after sensitive credentials from geopolitically prominent and diverse organizations is no surprise, Narang notes, though he adds that "the one thing that does kind of stray from the path would be its broad targeting, versus [its typical more] narrowly focused attacks."

Dependency Confusion Could Have Led to RCE in Google Cloud Platform

SecurityWeek

Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.

IoT Unplugged – S3:E7 – Establishing priorities for Cloud security

IoT Insider

In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums

TickerTV

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.

Study reveals 94% of global organisations suffered one or more business-impacting cyberattacks

Intelligent CISO
The key findings from the Tenable sponsored Forrester report are covered in this article.

How hackers took over Facebook accounts to steal $4 million, promote scams

Cyberscoop
Satnam Narang discusses social media ads and how cybercriminals are leveraging them to target specific audiences, pivot their techniques and avoid detection.

Vulnerability in WordPress email marketing plugin patched

The Daily Swig
Alex Peña details the serious implications of the WordPress plugin flaw he discovered.

Scammers find a new target: Teens on TikTok

Digital Trends
Satnam Narang spoke to Digital Trends about research from Tenable into the uptick in scams on TikTok.

TikTok scrubs ads promoting diet pills, fake apps after Tenable report

Cyberscoop
Cyberscoop quotes Satnam Narang in a piece about TikTok removing scams following a research report from Tenable that detailed the types of scams proliferating on the social media platform.

TikTok ads have pushed scams about apps, diet pills, other products, report says

CNET
CNET quotes Satnam Narang in a piece about Tenable’s research report into the types of scams on TikTok.

Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity

TickerTV
Nathan Wenzler, Chief Security Officer at Tenable discusses the impact of the great reshuffling on cybersecurity.

Microsoft fixes two-year-old MSDT vulnerability in August update

Computer Weekly
Satnam Narang takes a closer look at Microsoft's Patch Tuesday August update.

Guy March of Tenable lays out the channel angle on Security.

European Reseller
Guy March, Channel Director – EMEA, discusses infrastructure as code and the Shift Left movement.

Nationale Cybersicherheitsstrategie erfordert Cyberhygiene

ZDNet
Roger Scheer reacts to German Interior Minister Faeser's announcement of a protection program against hacker attacks.

Actively exploited zero-day and four 'critical' vulnerabilities fixed in Microsoft's July Patch Tuesday

IT Pro
Patch Tuesday analysis by SRT.

Glen Pendley on transparency from cloud infrastructure providers

TickerTV
Glen Pendley on transparency from cloud infrastructure providers.

メディアのお問い合わせ先

Corporate Public Relations [email protected]
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Offleash
[email protected]
UK
Brands2Life
[email protected]
+44 (0)20 7592 1200
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

メディアキット

Tenable メディアキットのダウンロードはこちらから。会社および製品のロゴと使用に関するガイドライン、経営幹部の顔写真、会社概要資料などがご利用いただけます。


一括ダウンロード