Combined with its cutting-edge,
#agentless
vulnerability-scanning technology, including its ability to detect anomalous behavior, this new
#malware
detection makes Tenable Cloud Security a more complete and effective solution.
#cloudsecurity
This just in! Tenable launches an enhanced, free version of our market-defining
#vuln
assessment solution that you know and love:
#Nessus
. Introducing Nessus Essentials:
A decade after its start,
@Forbes
is sharing the story of how Tenable's
@jack_daniel
transformed
@SecurityBSides
from a small conference into the large, ever-growing community you know today.
Oracle WebLogic is vulnerable to a new deserialization
#vulnerability
that could allow an attacker to execute remote commands on vulnerable hosts. PoC is below and you can find the details here:
Please be aware that there are fake PoC repos appearing on Github claiming to be CVE-2019-0708 including some with intentions to infect users with malware. There are currently no validated, public PoCs for this vulnerability at the moment.
Yesterday, Tenable kicked off our internal women
@Tenable
group! Not only are we committed to closing the gender gap in
#cybersecurity
, but also creating an open dialogue internally to ensure that Tenable is an inclusive environment for employees both present and future. 🙆♀️
We have officially acquired
@BitDiscovery
, a leader in external
#attacksurface
management (EASM). Paired with our market-leading solutions, customers will have a comprehensive view into known and previously unknown internet-facing assets.
#TenableResearch
discovered multiple buffer overflow vulnerabilities that can be triggered via a crafted HTTP request. An authenticated attacker may exploit these to execute code remotely.
ICYMI: We recently launched an enhanced, free version of our market-defining
#vuln
assessment solution that you know and love:
#Nessus
. Introducing Nessus Essentials:
Active Directory in the enterprise is a mess and leveraged by many advanced threats. Assessing and monitoring AD security is critical. Thrilled to announce our intent to acquire Alsid and expand cyber exposure and risk management.
Join Tenable on 10/23 in honoring Black practitioners in cyber. Follow
#ShareTheMicInCyber
& all the participants to learn about the talented practitioners involved
We’re celebrating 24 years of
#Nessus
, the Global Gold Standard in Vulnerability Assessment. 🎉 24 is the number of carats in 100% pure gold and we know this year will be the brightest yet. Reply in-thread ⬇️ with a clever birthday message and be entered to win a surprise.
Nessus Essentials: an enhanced, free version of our market-defining
#vuln
assessment solution that you know and love:
#Nessus
. Register here for an activation code:
Tenable was one of a handful of experts pre-notified by Rockwell Automation, in collaboration with the U.S. government, to provide awareness on these new
#operationaltechnology
vulnerabilities. (CVE-2023-3595) and (CVE-2023-3596)
"Researchers with Tenable on Tuesday disclosed 15 vulnerabilities – with the majority of these impacting Crestron AirMedia. However, two of those 15 vulnerabilities, impact an array of presentation platform systems." via
@threatpost
#TenableResearch
✨ We’re thrilled to welcome the
@TenableSecurity
team to MarketSite in honor of their IPO!
👏 Tenable is the first and only provider of Cyber Exposure solutions in the digital era.
#TenableIPO
“There goes my hero 🎶 “ Get the T-shirt reference? Our
#TenableResearch
team is getting in the spirit of
#BHUSA
and reverse engineering some hardware. Stay tuned this week for their social media takeover on the show floor!
#HackerSummerCamp
Oracle WebLogic is vulnerable to a new deserialization
#vulnerability
that could allow an attacker to execute remote commands on vulnerable hosts. PoC is below and you can find the details here:
#TenableResearch
We’re thrilled to have
@IndegyCom
join the Tenable team! Together, we’re delivering the industry’s first unified, risk-based platform for IT and OT security. Learn more here:
What an incredible 10 years it's been for Tenable. From being the creators of
#Nessus
to the pioneers of
#CyberExposure
, the last decade has been full of transformation for us. We look forward to seeing what the next 10 years brings us. Who else remembers the old school logo?!
It's official! Today we announced the integration of Tenable. io with Google Cloud SCC that allows organizations to have enhanced visibility intro their cloud assets via a single dashboard🤘
I Always Feel Like Somebody’s W̶a̶t̶c̶h̶i̶n̶g̶ Listening to Me 👂.
@Junior_Baines
discovers a vuln in a popular IP camera that potentially lets anyone listen to the camera's audio without authentication. Details here::
#TenableResearch
As
@splunk
's strategic VM vendor, we are excited to announce our partnership that brings together Tenable exposure management insights with Splunk log and flow consolidation capabilities to improve data-driven incident response.
Learn more:
Currently 5 plugins have been released for
#Log4j
vulnerability Plugin ID 155998, 155999, 156000, 156001, 156002.
We will update the blog as we release new plugins.
ICYMI: Tenable's Joe Bingham showed
#BSidesSF
how he was able to unlock a smart door by exploiting a
#vuln
in Logitech's Harmony Hub. Watch below or find the blog here:
#RSAC
#TenableResearch
#TenableResearch
has discovered that
@Microsoft
's Azure Site Recovery is vulnerable to a DLL hijacking attack due to incorrect directory permissions. Read more about the flaw on
@Medium
.
The products you know and love … unified in one platform. Introducing Tenable One: Exposure Management for the modern
#attacksurface
. Gain full visibility into all assets in one place. →
We're thrilled to announce that we’ve agreed to acquire
@AccuricsSec
! Together, we’ll deliver cloud security that is born on the left — fully integrating security into the DevOps process and leveraging IaC to prevent problems before deployment.
Yesterday, Nessus marked another year of best-in-class
#vulnerability
assessment! 🎉 Over the last 23 years, Nessus has seen incredible growth, and our team continues to advance the product. Take a look back at our history and find out what's new:
"Tenable Inc, which discovered the issues, said seven severe vulnerabilities in Blink’s XT2 camera systems could have given attackers full control over the device and allow them to view the camera footage remotely." via
@Reuters
Today on the Tenable Tech Blog, The
#TenableResearch
#vuln
detection team walks us through developing an exploit for a
#vulnerability
(CVE-2016–8735) in the popular servlet container — Tomcat.
I am G̶r̶o̶o̶t̶ root. A Hard-Coded NULL root user password
#vulnerability
was found in Alpine Linux Docker Images from Dec. 2015’s 3.3 version onward.
#TenableResearch
has shared solutions here:
#TenableResearch
Making It Rain with MikroTik...a sequel.
@Junior_Baines
goes into detail regarding an undisclosed
#vuln
in RouterOS that allows a remote, unauthenticated attacker to proxy crafted TCP and UDP requests through the router’s Winbox port.
#TenableResearch
Nessus v10 is here! Now available on Raspberry Pi, we’re making the power of Nessus portable. Learn more about the exciting product release.
#LoveNessus10
.
@BeyondTrust
has made a decision to exit the vulnerability management market and Tenable is thrilled to have been selected as its exclusive partner. Read more on the decision here:
“Do the basic blocking and tackling first. Understand and maintain your cyber hygiene. It makes all the difference in the world.” –
@ayoran
@
#TenableGovEdge
When it comes identifying
#vulns
and protecting your org, it doesn't have to feel like a game of whack-a-mole. Introducing predictive prioritization: focus on the seven percent of
#vulnerabilities
which pose the greatest actual risk.
#CyberExposure
.
@josephmenn
takes the stage to share the backstory of his new book: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
#Edge2019
A thank-you from CEO
@ayoran
on
#TenableIPO
day: "We built this company in close collaboration with the security community to make sure we are continuously adapting and growing as your needs change." Read Amit's blog post:
@StaySafeOnline
@CISAgov
A7: Timely software updates are critical because the time between vulnerability disclosure to exploitation is shrinking. Security researchers have seen vulnerabilities exploited within 15 minutes. To keep yourself cyber safe, you should update your software ASAP.
#CyberChat
Who doesn't love a good show and tell?
#TenableResearch
member Joe Bingham shares how he was able to unlock a smart door by exploiting a
#vuln
in Logitech's Harmony Hub. Watch below or find the blog here:
#cybersecurity