Aggregator
Шереметьево парализовано: сбой в ИТ-системах «Аэрофлота» отменил десятки рейсов
【安全圈】俄航空业遭遇"飞鹰行动":货运单背后的数字暗战升级
【安全圈】凤凰城IT代理人的双面游戏:一位美国主妇如何成为朝鲜核计划的"远程提款机"
【安全圈】微软AI重塑Windows 11资讯体验:MSN新闻将升级为"Copilot Discover"智能推荐
【安全圈】微软解除Windows 11 24H2游戏反作弊系统限制 数百万玩家将迎自动更新
400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability
A critical security vulnerability has been discovered in the popular Post SMTP plugin for WordPress, potentially exposing over 400,000 websites to account takeover attacks. The vulnerability, tracked as CVE-2025-24000, affects versions 3.2.0 and below of the plugin, allowing even low-privileged users to access sensitive email data and ultimately gain administrative control of affected websites as […]
The post 400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations
A major cybersecurity breach has exposed the browsing activities of users visiting one of the internet’s most notorious illegal marketplaces. On Friday, July 18, cybersecurity firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million records of web requests, with 95% of traffic directed to leakzone[.]net, a prominent “leaking and cracking forum” that facilitates […]
The post Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations appeared first on Cyber Security News.
Niagara 框架中存在多个严重漏洞 影响全球智能楼宇和工业系统
Threat Actors Claim Breach of Airpay Payment Gateway
Cybercriminals have reportedly claimed a successful breach of Airpay, an Indian payment gateway service, raising serious concerns about the security of financial data and customer information. The allegations surfaced on underground forums where threat actors are allegedly offering access to sensitive data for sale, though the full extent and validity of the claimed breach remains […]
The post Threat Actors Claim Breach of Airpay Payment Gateway appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Их оружие — голос. Хакеры взламывают компании с помощью звонков в IT-поддержку
Scattered Spider targets VMware ESXi in using social engineering
Weekly Update 462
This will be the title of the blog post: "Court Injunctions are the Thoughts and Prayers of Data Breach Response". It's got a nice ring to it, and it resonates so much with the response to other disasters where the term is offered as a platitude
ISC.AI 2025“安全破局 生态突围”360数字安全生态合作伙伴大会议程提前看!
ISC.AI 2025 新型涉网犯罪打击与治理论坛 议程提前看!
ISC.AI 2025主题前瞻:ALL IN AGENT,全面拥抱智能体时代!
New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control
A critical new threat targeting Microsoft SharePoint servers through a sophisticated exploit chain dubbed “ToolShell.” This multi-stage attack combines previously patched vulnerabilities with fresh zero-day exploits to achieve complete system compromise, affecting SharePoint Enterprise Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition. Key Takeaways1. ToolShell exploits four SharePoint CVEs (two patched, two zero-days) […]
The post New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control appeared first on Cyber Security News.
Women’s Dating App “Tea” Data Leak Exposes 13,000 User Selfies
Tea, a women-only dating safety app that allows users to review and share information about men they’ve dated anonymously, has suffered a significant data breach that exposed approximately 72,000 user images, including 13,000 sensitive selfies and photo identification documents submitted during account verification. The breach was discovered at 6:44 AM PST on Friday, July 25th, […]
The post Women’s Dating App “Tea” Data Leak Exposes 13,000 User Selfies appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Keys to Implementing Exposure Management
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on hesitations around exposure management. You can read the entire Exposure Management Academy series here.
The concept of a unified exposure management platform that consolidates all risk data into a single view makes a lot of sense. The promise is real: reduce noise, improve prioritization and align security efforts with business objectives.
In a recent webinar, Security Without Silos: Gain Real Risk Insights with Exposure Management Upsized, attendees showed significant interest in this approach. More than a quarter of the audience said they are either actively implementing or exploring an exposure management program.
Adopting any new enterprise-wide platform can seem daunting, and Tenable’s live polling confirmed the key sources of hesitation.
When asked about their biggest concerns regarding the implementation of an exposure management platform, attendees were clear: 27% were concerned about demonstrating ROI and value, 25% wondered about integration complexity with existing tools and 18% worried about time and resources required for deployment.
Exposure management hesitationsSource: Tenable webinar poll of 89 respondents, April 2025
These issues are valid concerns that deserve direct answers. Let's tackle the top three one by one, using insights from the webinar to show how a modern approach to exposure management can help overcome these challenges.
1. Proving ROI to leadershipSecuring budget dollars for any technology requires a clear view into the value it will provide to the organization. But ROI for security tools can sometimes feel hard to pin down. So, how do you translate technical findings into business value?
Above all, unified exposure management drives efficiency, consolidating work and tools under an umbrella program. With a single data store, the tools work more efficiently, security teams can focus on high-value areas and constituents around the enterprise get the information they need in unified dashboards.
That sounds good. But you need to scale. Mention that word to any tech or finance leader and all they’ll see are dollar signs. It usually means more licenses, more tech resources and more headcount. And it definitely doesn’t help you build your ROI argument. In fact, it’s often a great recipe for blowing your budgets out of the water.
This is where an exposure management platform can help.
Rather than continuing the typical linear, siloed approach, an exposure management platform requires only a portion of your available staff and budget to scale security horizontally. It extends visibility across all assets and risks in your attack surface by collecting data across your disparate tools. Then it adds critical context that can identify and prioritize the exposures that matter.
When it comes to showing ROI, the ability to consolidate and scale efficiently are hard to beat.
2. Integration with existing tools will be too complexThe fear of a complex integration often stems from past experiences with legacy systems that required deploying more agents, cumbersome network changes and brittle custom scripts.
Many worry that a new platform will only add to their technical debt.
The reality is that modern exposure management platforms are fundamentally different. As the webinar showed, these systems are built on an API-first philosophy.
Rather than ripping and replacing your existing security stack, a platform like Tenable One is designed to ingest data from it. Through pre-built connectors and flexible APIs, it pulls findings from your existing endpoint detection products, cloud security tools and other security solutions.
This approach consolidates your security data without adding intrusive agents, making the integration process far less complex than anticipated.
3. We don't have the time or resources for a massive deploymentTime and resources may be the most common barrier to change. With teams already stretched thin — a fact confirmed by 55% of attendees who cited resource constraints — the idea of a months-long, "big bang" deployment is a non-starter.
Pragmatism is the key.
As the webinar showed, you don’t have to "boil the ocean.” A successful exposure management implementation is not an all-or-nothing affair.
The best approach is to start small and scope the program for a feasible, high-impact win. Focus on a single team, a specific business unit or one critical use case. Maybe building a unified asset inventory for your cloud infrastructure would be a good start.
By showing success in one area, you can build momentum, secure broader buy-in and expand the program organically over time. This phased approach respects your team's limited resources while delivering incremental value.
Although the concerns around implementing a new program are understandable, a modern, pragmatic approach to exposure management can address them and offer a path to reduced risk and demonstrable value. In the analyst report titled How to grow vulnerability management into exposure management, you can learn the best ways to get started.
TakeawaysROI is achievable with a unified exposure management platform. It drives efficiency through proactive cyber hygiene, enables risk-based prioritization to identify "choke points" and offers unified dashboards for business-centric reporting.
As an API-first platform with pre-built connectors, exposure management simplifies integration. Best of all, you can deploy in phases. Start small with a single team or critical use case and then translate that success into a broader program.
Learn more- Check out the Tenable exposure management resource center to discover the value of exposure management and explore resources to help you stand up a continuous threat exposure management program.