Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

September 30, 2025

The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration

Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud Assist; and exfiltration of the user’s saved information and location data via the Gemini Browsing Tool.

July 10, 2023

Tenable Cyber Watch: Study Finds Many CISOs Are Unqualified to Serve on Boards, How Cybersecurity Boosts Business, and more

This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards.


July 7, 2023

Cybersecurity Snapshot: ChatGPT-like Tools Will Boost Developers’ Speed – and Amplify Cyber Risk

Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? And much more!


July 4, 2023

An Unexpected Implication of Lambda Privileges

Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance.


July 3, 2023

Tenable Cyber Watch : Feds Offer $10 Million Reward for CL0P Info, Best Practices for Ransomware Incident Response, and more

This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure…


June 30, 2023

Cybersecurity Snapshot: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill 

Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!


June 29, 2023

The Default Toxic Combination of GCP Compute Engine Instances

By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix.


June 29, 2023

Sécurité OT dans le secteur maritime : eaux troubles ou navigation tranquille ?

Le secteur maritime n'échappe pas à la vague de changements liés à la cyber-sécurité. Les navires interconnectés et les nouvelles technologies qui permettent au monde du transport maritime de devenir plus efficace introduisent également un cyber-risque. Here's what you need to know about the challenges and risks these floating cities face …


June 28, 2023

How Exposure Management Can Make Pen Testing More Effective

Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.


June 27, 2023

Réduire concrètement les risques dans la chaîne de production

La cyber-sécurité pour le secteur industriel fait beaucoup de bruit, mais par quoi faut-il commencer ? Commençons tout simplement par les motivations des attaquants et ce qu'il faut faire pour les arrêter. Il s'agit avant tout de réduire le risque et de faire en sorte que les mesures que vous prenez portent leurs fruits. Read on to learn…


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >

× Contactez notre équipe commerciale