This Is How to Do Simple, Fast and Accurate Web App Security
April 27, 2020Web apps are the most common attack vector causing data breaches today. Here’s how Tenable.io Web Application Scanning, built by Tenable Research, can help security teams protect their web app estate....
What Is VPR and How Is It Different from CVSS?
April 16, 2020This blog series will provide an in-depth discussion of vulnerability priority rating (VPR) from a number of different perspectives. Part one will focus on the distinguishing characteristics of VPR th...
COVID-19: Instagram Advertisements Selling Masks, Sanitizer and Other Essentials Appear Despite Ban
March 27, 2020Opportunists pushing the sales of masks, hand sanitizer and other essentials are circumventing an advertising ban on Instagram to capitalize on fears spurred by the novel coronavirus. Cybercriminals ...
COVID-19: Novel Coronavirus Becomes Hotbed for Misinformation, Scams and Fake Cures
March 19, 2020The worldwide fear and uncertainty surrounding the novel coronavirus isn’t just being leveraged in malware and phishing attacks, as it has also enabled the spread of misinformation, fake cures and a v...
Cryptocurrency Scams: Fake Giveaways Impersonate Followers of Political and Other Notable Figures
February 19, 2020“Thank you Elon,” “God Bless You Elon” and “God Bless You Donald” – scammers have been lurking in the Twitter replies of the U.S. President, Tesla CEO and other notable figures, impersonating follower...
Objects in Mirror Are Closer Than They Appear: Reflecting on the Cybersecurity Threats from 2019
December 16, 2019Tenable’s Security Response Team reviews the biggest cybersecurity threats of 2019. With 2019 coming to an end, the Tenable Security Response Team reflects on the vulnerabilities and threats that had...
Microsoft's December 2019 Patch Tuesday Includes Fix for Zero Day Exploited in the Wild (CVE-2019-1458)
December 10, 2019Microsoft closes out 2019 by patching 36 CVEs, including one flaw that was exploited in the wild as a zero-day. Microsoft sent administrators around the world an early holiday gift with a lighter-tha...
A Look at the Vulnerability-to-Exploit Supply Chain
December 4, 2019Last week, Tenable Research released the report, How Lucrative Are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain, which takes a close look at the vulnerability-to-exploit...
Microsoft's November 2019 Patch Tuesday: Tenable Roundup
November 12, 2019With over 70 CVEs, Microsoft’s November 2019 Patch Tuesday corrects 13 critical vulnerabilities, including a patch for an Internet Explorer vulnerability exploited in the wild. Microsoft’s November ...
No, You Aren’t Being Invited to Win a New Car. That’s Spam on Your Calendar
September 11, 2019By abusing the automatic event creation feature of integrated email calendars, spammers are finding ways to send you malicious links that are harder to ignore. Background In June, researchers at Kas...
Microsoft's September 2019 Patch Tuesday: Tenable Roundup
September 10, 2019Microsoft’s September 2019 Security Updates address 79 vulnerabilities, 17 of which are rated critical. Microsoft’s September 2019 Patch Tuesday release contains updates for 79 CVEs, 17 of which...
TikTok Scams: How Social Currency Fuels the Economy for Impersonation Accounts and Free-Followers-and-Likes Services
August 14, 2019The economic engine on social media platforms are the followers (or fans) and likes. Scammers take advantage of this economy, while others seek out ways to grow their following inorganically by impers...