More Visibility into Metrics: Tenable.io Gets New Dashboards

More Visibility into Metrics: Tenable.io Gets New Dashboards

|
Tenable.io users have been asking for new dashboards to make implementing Cyber Exposure easier, and the Tenable dashboard and reporting teams have delivered. We’ve added five new dashboards to Tenable.io, allowing you to gain more visibility into key topics like vulnerability metrics, risk mitigations and exploit reporting. These five new ... Read More
Intel AMT Back in the News

Intel AMT Back in the News

The release of new research from F-Secure spells more trouble for Intel’s Active Management Technology (AMT). AMT is used for remote access monitoring and maintenance in corporate environments. Previously, in 2017, researchers discovered a critical vulnerability with AMT that made headlines. The previous vulnerability was a wide-reaching privilege escalation vulnerability ... Read More
The First Major Security Logos of 2018: Spectre and Meltdown Vulnerabilities

The First Major Security Logos of 2018: Spectre and Meltdown Vulnerabilities

A major flaw in the way modern CPUs access cache memory could allow one program to access data from another program. The latest security vulnerability affects a majority of systems, if not all, used today. The vulnerabilities are named Spectre and Meltdown and also have a dedicated website. According to ... Read More
Detecting macOS High Sierra root account vulnerability (CVE-2017-13872)

Detecting macOS High Sierra root account vulnerability (CVE-2017-13872)

|
On November 28, 2017 a software developer (Lemi Orhan Ergin) reported a critical flaw in macOS High Sierra which allows any local user to log in as root without a password after multiple attempts. The vulnerability was originally thought to only be exploitable if you had physical access to the ... Read More
Mr. Robot Cleaning House at E-Corp

Mr. Robot Cleaning House at E-Corp

|
The second episode of Mr. Robot finds Elliot starting his new job at E-Corp. As he joins his new team and is looking to find a way to delay the shipment of all the paper data to New York facility, Elliott runs into the normal corporate middle management delays. He ... Read More
Detecting Bad Rabbit Ransomware

Detecting Bad Rabbit Ransomware

|
A new ransomware dubbed Bad Rabbit has hit several targets and began spreading across Russia and Eastern Europe on Tuesday, October 24, 2017. The ransomware exploits the same vulnerabilities exploited by the WannaCry and Petya ransomware that wreaked havoc in the past few months. As new versions of ransomware using ... Read More
Understanding Exploitability

Understanding Exploitability

|
Tenable.io Advanced FiltersVulnerability exploits have been in headlines around the world in recent months for being a leading source of cyber risk. As a result, your organization’s leadership may have started to ask whether your network is vulnerable to exploitation. The answer to that question often lies in the relationship ... Read More
Is the Devil’s Ivy in your Network?

Is the Devil’s Ivy in your Network?

|
Over the past several years, Tenable has discussed the growing concerns around Internet of Things (IoT) security. With the static nature of IoT devices such as cameras, door sensors, and many more, the ability to correct flaws in third-party libraries becomes increasingly difficult. Yesterday, the researchers at Senrio discovered a ... Read More