Remove Infrastructure Remove Malware Remove Webinar
article thumbnail

Cybersecurity Snapshot: Medusa Ransomware Impacting Critical Infrastructure, CISA Warns, While NIST Selects New Quantum-Resistant Algorithm

Tenable

Meanwhile, Tenable did a deep dive on DeepSeeks malware-creation capabilities. 1 - CISA: Hundreds of critical infrastructure orgs hit by Medusa ransomware Dont let the Medusa ransomware group turn your network into stone. Plus, another cryptographic algorithm that resists quantum attacks will be standardized. Thats the message the U.S.

article thumbnail

What Makes This “Data Privacy Day” Different?

Tenable

It has been well documented how attackers are leveraging AI to write more sophisticated and effective malware for ransomware attacks, as well as to enhance phishing scams and more. Learn more Webinar: Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?

Data 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits

Tenable

The report also looks at how trends like geopolitical cyberthreats, ransomware and infostealer malware are likely to develop in 2025. CIS Oracle Cloud Infrastructure for Kubernetes (OKE) Benchmark v1.6.0 CIS Oracle Cloud Infrastructure for Kubernetes (OKE) Benchmark v1.6.0 Check out the results! (51 CIS Apple macOS 13.0

System 75
article thumbnail

How to manage cloud exploitation at the edge

CIO

The Infrastructure-as-a-Service (IaaS) cloud computing model enables remote working, supports digital transformation, provides scale, increases resilience, and can reduce costs. Cloud infrastructure is especially sensitive, as many critical applications are at risk, such as customer-facing applications. Watch on-demand here.

Cloud 148
article thumbnail

Securing Critical Infrastructure: 4 Steps for Reducing Cyber Risk

Tenable

For critical infrastructure organizations, the gains of automation and IoT technology have also meant heightened threats. Risk management is paramount for organizations that provide “critical infrastructure” services, whose operational technology (OT) ensures the fabric of our national security and modern ways of life.

article thumbnail

Cybersecurity Snapshot: First Quantum-resistant Algorithms Ready for Use, While New AI Risks’ Database Is Unveiled

Tenable

And get the latest on Q2’s most prevalent malware, the Radar/Dispossessor ransomware gang and CVE severity assessments! Think Again ” 4 - A Tenable poll on CVE severity assessments During a recent webinar about Tenable Security Center , we polled attendees about how they assess the severity of Common Vulnerabilities and Exposures (CVEs.)

article thumbnail

Securing Critical Infrastructure: 4 Steps for Reducing Cyber Risk

Tenable

For critical infrastructure organizations, the gains of automation and IoT technology have also meant heightened threats. Risk management is paramount for organizations that provide “critical infrastructure” services, whose operational technology (OT) ensures the fabric of our national security and modern ways of life.