Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

September 30, 2025

The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration

Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud Assist; and exfiltration of the user’s saved information and location data via the Gemini Browsing Tool.

September 30, 2021

Taking IBM QRadar SIEM One Step Further Using Tenable.ad

If you can't continuously monitor Active Directory, it's impossible to achieve full visibility into your evolving attack surface. Here's how combining Tenable.ad with IBM QRadar can help. It's no secret that CISOs are constantly challenged with new cyberthreats across an expanding attack surface…


September 22, 2021

Spotlight on the Kingdom of Saudi Arabia: The New World Of Work Introduces Risks Attackers Can Utilize

A new world of work has been adopted by Saudi Arabian organizations, with many planning to make hybrid and remote work models permanent. Here’s how these changes are increasing risk. The transition to cloud adoption and remote work practices, which were being cautiously adopted in Saudi Arabia…


September 22, 2021

Spotlight on India: A Perimeter-less Workplace Introduces More Risk

India's plans for hybrid work models in the next 12-24 months are outpacing the speed of security in India. Find out where organizations need to place their focus to secure the new world of work. The rapid deployment of new technologies to facilitate remote work heightened the level of risk for…


September 22, 2021

Spotlight on Australia: Remote Work is Here to Stay and So are Cyberattacks

Snap lockdowns are making remote work models a permanent feature — and leaving organisations more exposed to risk. Find out how the floodgates for cyberattacks have opened in Australia.  As many Australians grapple with long stints of remote work due to snap lockdowns, it's looking more…


September 21, 2021

An Introduction to “Scan Everything”

A “scan everything” approach tests and triages every asset to understand your organization’s risk and how to reduce risk quickly and efficiently.


September 20, 2021

How to Talk to Your Boss About Zero Trust

A recent Executive Order from the Biden Administration put zero trust architecture in the spotlight. When your top execs come asking about it, here's what you need to know. President Joseph R. Biden's May 12 Executive Order on Improving the Nation's Cybersecurity brought renewed interest in zero…


September 17, 2021

CVE-2021-38647 (OMIGOD): Critical Flaw Leaves Azure Linux VMs Vulnerable to Remote Code Execution

Agents installed by default on Azure Linux virtual machines are vulnerable to a remote code execution flaw that can be exploited with a single request. Background On September 14, researchers at Wiz disclosed a set of four vulnerabilities in Microsoft’s Open Management Infrastructure (OMI), an…


September 13, 2021

Security Defined As Code - Why Tenable has entered into an agreement to acquire Accurics

Tenable has entered into an agreement to acquire Accurics. Más información.


September 9, 2021

Cómo hablarle a la junta de administración acerca de Zero Trust

Framing zero trust as a cybersecurity strategy for reducing business risk is a surefire way to get your executive leadership to take notice. It's no secret that CISOs and other cybersecurity leaders struggle to communicate with executive management and boards of directors in a language they can…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >

× Póngase en contacto con nuestro equipo de ventas