Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

September 30, 2025

The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration

Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud Assist; and exfiltration of the user’s saved information and location data via the Gemini Browsing Tool.

May 29, 2023

Tenable Cyber Watch: OpenAI CEO Testifies Before Congress; Meet DarkBERT, New AI Trained on the Dark Web; and more

This week’s edition of the Tenable Cyber Watch unpacks Sam Altman’s testimony before Congress on AI risks and regulations, and addresses the importance of cyberattack victims speaking up after an attack. Also covered: An introduction to DarkBERT, the only AI trained on the Dark Web.


May 26, 2023

Cybersecurity Snapshot: How Enterprise Cyber Leaders Can Tame the ChatGPT Beast

Check out a guide written for CISOs by CISOs on how to manage the risks of using generative AI in your organization. Plus, the White House unveils an updated national AI strategy. Also, a warning about a China-backed attacker targeting U.S. critical infrastructure. And much more!


May 25, 2023

Volt Typhoon: International Cybersecurity Authorities Detail Activity Linked to Chinese-State Sponsored Threat Actor

Several international cybersecurity authorities from the United States, United Kingdom, Australia, Canada and New Zealand issue a joint advisory detailing tactics, techniques and procedures used in recent attacks by a Chinese state-sponsored threat actor.


May 24, 2023

Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development

With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of…


May 23, 2023

How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines

Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.


May 22, 2023

Tenable Cyber Watch: Protecting Quantum Computers from Cyberattacks, AI Vulnerability Management, and more

This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors.


May 19, 2023

Cybersecurity Snapshot: As OpenAI Honcho Hits Capitol Hill, Regulatory Storm Clouds Form Over AI La La Land

Check out what OpenAI’s CEO told lawmakers in Congress about regulating AI. Meanwhile, an upcoming EU law could cramp ChatGPT’s style. Also, the public’s nail biting over AI is real. In addition, a new AI chatbot may soon answer your burning questions about the dark web. And much more!


May 18, 2023

U.S. and Australian Agencies Publish Joint Cybersecurity Advisory on BianLian Ransomware Group

Le FBI, l'ACSC et la CISA ont publié un avis conjoint sur la cyber-sécurité concernant le groupe de ransomware BianLian.


May 15, 2023

Changement des noms de produit Tenable et évolution de la marque Tenable

Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. 


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >

× Contactez notre équipe commerciale