LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities
Tenable Research revealed "LeakyLooker," a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have let attackers exfiltrate or modify data across Google services like BigQuery and Google Sheets. Google has since remediated all identified issues.
New Malicious npm Package "ambar-src" Targets Developers with Open Source Malware
Tenable Research investigated a malicious npm package with around 50,000 downloads in the public registry. We observed various detection-evasion techniques and saw it deploy multiple powerful open-source malware variants.
La trampa de la velocidad de la nube y la IA: Por qué el gobierno va a la zaga de la innovación
La adopción de la IA está superando al gobierno cibernético tradicional. El Informe 2026 de Tenable: El riesgo de la seguridad de IA y nube, revela cómo las identidades con privilegios excesivos y las dependencias de la cadena de suministro sin monitorear dejan a las organizaciones expuestas. Aquí le presentamos 10 tácticas para cerrar sus rutas de ataque más críticas.
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions.
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
Tenable Cloud Security continues to expand the technical depth of our Tenable One exposure management platform. Our latest enhancements include unified multi-cloud exploration, high-fidelity network validation, and expanded entitlement visibility across infrastructure and identity providers.
Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
This recognition — based entirely on feedback from the people who use our products every day — to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide.
La regla del 3 %: cómo silenciar el 97 % de sus alertas en la nube y estar más seguro
Priorización de lo que hay que arreglar primero y por qué es importante
Complying with the Monetary Authority of Singapore’s Cloud Advisory: cómo puede ayudar Tenable
The Monetary Authority of Singapore’s cloud advisory, part of its 2021 Technology Risk Management Guidelines, advises financial institutions to move beyond siloed monitoring to adopt a continuous, enterprise-wide approach. These firms must undergo annual audits. Here’s how Tenable can help.
Securing Federal Cloud Environments: Overcoming 5 Key Challenges with Tenable Cloud Security
U.S. government agencies face unique challenges as they adopt cloud technologies to meet digital modernization initiatives and adhere to a cloud-first policy. Here’s how Tenable Cloud Security FedRAMP can help.
Identificación y protección de las cargas de trabajo de IA
Learn why AI workloads demand a new approach to cloud security.
What’s New in Tenable Cloud Security: November Updates in Exposure Management
Tenable Cloud Security delivers critical capabilities to unify security across your entire attack surface. Our latest enhancements let you extend your on-prem vulnerability management program to the cloud; gain granular visibility into external access risk; and discover Snowflake sensitive data.
From Brittle to Scalable: AWS Boosts VPC Perimeter Security with New IAM Keys
AWS has released three new IAM condition keys for VPC endpoints to strictly limit access by specific accounts, organizational units, or AWS Organizations. Learn how these keys help you build scalable security perimeters and reduce manual policy maintenance.