Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited vulnerabilities to the Verizon DBIR and published a complementary deep-drive analysis.
Reader Advisory
Some articles posted in The SlickMaster's Files may contain themes, languages, and content which may neither appropriate nor appealing to certain readers. READER DISCRETION is advised.
Showing posts with label Tenable Research. Show all posts
Showing posts with label Tenable Research. Show all posts
03 May 2025
Newsletter: Tenable Research in Verizon DBIR: Additional Research Analysis
[THIS IS A PRESS RELEASE]
02 May 2025
Newsletter: Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform
[THIS IS A PRESS RELEASE]
Tenable, the cloud exposure management company, has uncovered a privilege escalation vulnerability in Google Cloud Composer (GCP) named ConfusedComposer. The vulnerability lets attackers with edit permissions in Cloud Composer to escalate privileges and gain access to a high-level service account with broad permissions across GCP.
26 March 2025
Newsletter: Tenable Research Reveals Popular AI Tools Used in Cloud Environments are Highly Vulnerable
[THIS IS A PRESS RELEASE]
Tenable®, the exposure management company, today announced the release of its Cloud AI Risk Report 2025, which found that cloud-based AI is prone to avoidable toxic combinations that leave sensitive AI data and models vulnerable to manipulation, data tampering and data leakage.
25 March 2025
Newsletter: Tenable Research finds that DeepSeek R1 can be tricked into developing malware
[THIS IS A PRESS RELEASE]
When new technologies such as generative artificial intelligence (GenAI) emerge, cybercriminals inevitably look for ways to exploit its capabilities for malicious purposes. While most mainstream GenAI models have built-in safeguards to prevent misuse, Tenable Research has found that DeepSeek R1 can be tricked into generating malware, raising concerns about the security risks posed by AI-powered cybercrime.
13 March 2025
Newsletter: Tenable Research Finds Critical Vulnerabilities in Kubernetes Environments
[THIS IS A PRESS RELEASE]
According to Tenable Cloud Research, organisations globally and across the Asia Pacific region are increasingly facing security challenges in their Kubernetes environments. As more businesses adopt Kubernetes to orchestrate their cloud infrastructure, serious security gaps in these environments are leaving organisations vulnerable to attacks.
Subscribe to:
Posts (Atom)