Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

September 30, 2025

The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration

Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to search-injection attacks on its Search Personalization Model; log-to-prompt injection attacks against Gemini Cloud Assist; and exfiltration of the user’s saved information and location data via the Gemini Browsing Tool.

January 23, 2024

CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Vulnerability

Proof-of-concept exploit details are available for a newly disclosed critical vulnerability in Fortra GoAnywhere Managed File Transfer (MFT), a product historically targeted by ransomware


January 23, 2024

CVE-2023-22527: Atlassian Confluence Data Center and Server Template Injection Exploited in the Wild

In the wild exploitation has begun for a recently disclosed, critical severity flaw in Atlassian Confluence Data Center and Server


January 22, 2024

Aumente o nível da sua estratégia de segurança da nuvem

Learn how to better your cloud security program with these ten security resolutions.


January 19, 2024

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. Plus, the challenges stressing out CISOs are also opening new doors for them. In addition, the latest on the Androxgh0st malware…


January 19, 2024

Use seus logs internos para ter uma resposta melhor a incidentes e detecção de anomalias

Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks.


January 18, 2024

Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions

The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.


January 17, 2024

Atualização de patch crítico de janeiro de 2024 da Oracle trata de 191 CVEs

Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates.


January 16, 2024

CVE-2023-6548, CVE-2023-6549: Vulnerabilidades de dia zero exploradas no Citrix NetScaler ADC e NetScaler Gateway

Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws.


January 16, 2024

Além do horizonte: as 5 principais tendências de segurança na nuvem a serem observadas em 2024

Não há dúvidas de que a IA generativa impulsionará os recursos de segurança cibernética das organizações. No entanto, os departamentos de segurança cibernética colherão poucos frutos com a IA generativa sem antes aplicar princípios sólidos de segurança da nuvem. In this blog, we explain the top cloud security trends that organizations must track –…


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

Análise do ecossistema de ransomware

Fazer download do relatório >

× Entre em contato com nossa equipe de vendas