Criminal IP and Tenable Partner for Swift Vulnerability Detection

Criminal IP, a prominent Cyber Threat Intelligence search engine developed by AI SPERA, has recently established a technical partnership with Tenable, a global leader in exposure management.
This partnership is designed to equip users with a robust solution for threat analysis and exposure management through seamless data integration and joint marketing efforts.
The key feature of this technical alliance lies in streamlining the essential data and information of IP addresses provided by the Criminal IP search engine to Tenable Vulnerability Management.
Integrating Criminal IP with Tenable Vulnerability Management will equip users with the comprehensive feature of Criminal IP for detecting IP assets.
This feature allows organizations to gain aggregated information on their assets, facilitating them to proactively identify and mitigate any potential threats to their IT assets.
It was also provided with the seamless importation of these assets into the Tenable platform.
The seamlessly imported IP assets include crucial details like network subnet, device type, and connected domains, providing a comprehensive picture for deeper insights.
Users can then leverage the Tenable scanner to proactively run real-time vulnerability and maliciousness scans, revealing the latest security posture of their assets.
By importing essential data about the IP address, users can proactively assess the severity level of vulnerabilities on their assets within the Tenable Vulnerability Management platform.
This clear and organized presentation of vulnerability severity empowers informed decision-making regarding cybersecurity strategy.
The integration will soon be available to all users of Tenable Vulnerability Management.
The two companies are dedicated to collaboration, not only through a technical partnership but also across various aspects, including hosting joint marketing events.
Beyond providing users with a quick status assessment of exposed cyber assets, these companies actively address the challenges faced by security managers in organizations with specific use cases.
About AI SPERA. AI SPERA launched its global cybersecurity service, Criminal IP, on April 17, 2023, following a successful year-long beta phase.
The company has established technical and business partnerships with acclaimed global security firms, including VirusTotal, Cisco, Anomali, LogRhythm, Datadog, and more.
Criminal IP also offers Criminal IP ASM, an attack surface management solution, which provides users with dashboard access to auto-monitored assets exposed to attack surfaces.
Notably, AI SPERA recently secured a U.S. patent for the IP-based Security Control Method and System embedded in Criminal IP ASM. Available in five languages, the search engine ensures a powerful service for users worldwide.


This Cyber News was published on www.bleepingcomputer.com. Publication date: Tue, 09 Jan 2024 16:30:29 +0000


Cyber News related to Criminal IP and Tenable Partner for Swift Vulnerability Detection

Multiple Vulnerabilities in Sante PACS Server - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Progress WhatsUp Gold Unauthenticated Wireless MAC Group Manipulation - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
9 hours ago Tenable.com
Criminal IP and Tenable Partner for Swift Vulnerability Detection - Criminal IP, a prominent Cyber Threat Intelligence search engine developed by AI SPERA, has recently established a technical partnership with Tenable, a global leader in exposure management. This partnership is designed to equip users with a robust ...
1 year ago Bleepingcomputer.com
Google Cloud Platform (GCP) Privilege Escalation Vulnerability in GCP Cloud Run - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Google Gerrit Unauthorized Access to Code Tickets Supply Chain Attack - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Granola API Endpoint Information Disclosure - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Camaleon CMS Privilege Escalation - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
OpenAI SearchGPT Results Tampering with Prompt Injection - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
3 weeks ago Tenable.com
Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence - Criminal IP, a renowned Cyber Threat Intelligence search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address to protect users by blocking ...
11 months ago Hackread.com
Own Company Unveils New Channel Partner Program - Own Company, a leading SaaS data platform, today announced the launch of a global Channel Partner Program aimed at empowering resellers and system integrators to proactively prevent their customers from losing mission-critical data and metadata. With ...
1 year ago Itsecurityguru.org
Cyber Insights 2023: Criminal Gangs - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. Despite some geopolitical overlaps with state attackers, the majority of ...
2 years ago Securityweek.com
CVE-2022-1642 - A program using swift-corelibs-foundation is vulnerable to a denial of service attack caused by a potentially malicious source producing a JSON document containing a type mismatch. This vulnerability is caused by the interaction between a ...
2 years ago
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
1 week ago Cybersecuritynews.com
How do I block Taylor Swift news from invading my Facebook timeline? - The short answer is that you can't block Taylor Swift from invading your Facebook line. Over the years, Facebook has tested features that allow users to mute certain words from appearing on a user's timeline Feed. In the old days, being able to ...
1 year ago Pandasecurity.com
Criminal IP ASM: A new cybersecurity listing on Microsoft Azure - AI SPERA, a leader in Cyber Threat Intelligence-based solutions, today announced that Criminal IP ASM is now available on the Microsoft Azure Marketplace. As an officially certified ISV partner of Microsoft, AI SPERA offers services and technology ...
1 year ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
3 weeks ago Cybersecuritynews.com
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
1 week ago Cybersecuritynews.com
CVE-2016-82013 - Tenable recently worked with Synacktiv to perform security testing for Nessus, as part of an ongoing initiative to proactively address security issues. During the test, their team found two issues that may impact a Nessus vulnerability scanner. Both ...
55 years ago Tenable.com
CVE-2016-82012 - Tenable recently worked with Synacktiv to perform security testing for Nessus, as part of an ongoing initiative to proactively address security issues. During the test, their team found two issues that may impact a Nessus vulnerability scanner. Both ...
55 years ago Tenable.com
Best MDR (Managed Detection & Response) Solutions - 2025 - Cybereason Managed Detection and Response solutions provide 24/7 threat monitoring, advanced endpoint protection, and rapid incident response. Cynet MDR solutions provide automated threat detection and response, ensuring comprehensive security ...
3 weeks ago Cybersecuritynews.com
A primer on storage anomaly detection - Anomaly detection plays an increasingly important role in data and storage management, as admins seek to improve security of systems. In response to these developments, more vendors incorporate storage anomaly detection capabilities into their ...
1 year ago Techtarget.com
PXP: Enabling Our Partnership, Now and Into the Future! - It was great to see many of you at Cisco Partner Summit 2023 and to have many others experience the Partner Summit Digital broadcast. The content from the main stage keynotes and breakout sessions can be found at the Cisco Partner Launch Experience. ...
1 year ago Feedpress.me
CVE-2024-1683 - Tenable Identity Exposure Secure Relay leverages third-party software to help provide underlying functionality. One of the third-party components (Envoy) was found to contain vulnerabilities, and updated versions have been made available by the ...
1 year ago Tenable.com
CVE-2025-1091 - Tenable Identity Exposure leverages third-party software to help provide underlying functionality. Several of the third-party components (node.js, Envoy, libcurl) were found to contain vulnerabilities, and updated versions have been made available by ...
2 months ago Tenable.com

Latest Cyber News


Cyber Trends (last 7 days)