Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

September 30, 2025

The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration

Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud Assist; and exfiltration of the user’s saved information and location data via the Gemini Browsing Tool.

July 31, 2024

Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization

As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help.


July 30, 2024

EU AI Act: Will your company be the next to face the average €20 million fine for violating the regulation?

The European Union Artificial Intelligence Act includes specific provisions to ensure the cybersecurity of high-risk AI systems. We break down key elements of the ruling and offer guidance on how to prepare your organization.


July 30, 2024

EPSS zeigt starke Leistung bei der Vorhersage von Exploits, so die Studie von Cyentia und FIRST

Tenable hat eine Studie von Cyentia und FIRST gesponsert, die zu dem Ergebnis kommt, dass die Ausnutzung von Schwachstellen zwar sehr variabel ist, EPSS aber immer besser in seiner Fähigkeit wird, eine Ausnutzung vorherzusagen.


July 26, 2024

Cybersecurity Snapshot: North Korea’s Cyber Spies Hunt for Nuclear Secrets, as Online Criminals Ramp Up AI Use in the EU

Check out a CISA-FBI advisory about North Korean cyber espionage on critical infrastructure orgs. Plus, what Europol found about the use of AI for cybercrime. Meanwhile, the risk concerns that healthcare leaders have about generative AI. And a poll on water plant cybersecurity. Und noch viel mehr!


July 24, 2024

ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions

Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs…


July 23, 2024

Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design

With the unprecedented tech outages experienced by so many of our customers over the last week, we recognize the need for deeper understanding of our software development processes and how they support global business continuity. In this blog post, we’ll outline how Tenable’s comprehensive approach…


July 23, 2024

If You Only Have Five Minutes, Here’s CNAPP in a Snap (But We Have an eBook, Too)

Wenn Sie das ganze Gerede über Cloud Native Application Protection Platforms (CNAPPs) etwas verwirrt, keine Sorge. Our new eBook “Empower Your Cloud: Mastering CNAPP Security” explains in plain English what CNAPP is, how it works and why it’ll help you secure your cloud environment confidently. Read…


July 22, 2024

Improving Your Cloud Security Using JIT Access for Sensitive SaaS Applications

Using just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege.


July 22, 2024

How To Do a Security Audit of Pimcore Enterprise Platform

Our new research paper gives you a roadmap for using Pimcore's features while preserving security.


Aktuelles zum Thema Cybersecurity

Geben Sie Ihre E-Mail-Adresse ein, um zeitnahe Warnungen und Sicherheitsempfehlungen von den Experten bei Tenable zu erhalten.

Ein Einblick in das Ransomware-Ökosystem

Bericht herunterladen >

× Vertriebsteam kontaktieren