New Malicious npm Package "ambar-src" Targets Developers with Open Source Malware
Tenable Research investigated a malicious npm package with around 50,000 downloads in the public registry. We observed various detection-evasion techniques and saw it deploy multiple powerful open-source malware variants.
The Cloud and AI Velocity Trap: Why Governance Is Falling Behind Innovation
AI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities and unmonitored supply chain dependencies leave orgs exposed. We offer 10 tactics to shut down your most critical attack paths.
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions.
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
Tenable Cloud Security continues to expand the technical depth of our Tenable One exposure management platform. Our latest enhancements include unified multi-cloud exploration, high-fidelity network validation, and expanded entitlement visibility across infrastructure and identity providers.
Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
This recognition — based entirely on feedback from the people who use our products every day — to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide.
The 3% Rule: How To Silence 97% of Your Cloud Alerts and Be More Secure
Prioritizing what to fix first and why that really matters
Complying with the Monetary Authority of Singapore’s Cloud Advisory: How Tenable Can Help
The Monetary Authority of Singapore’s cloud advisory, part of its 2021 Technology Risk Management Guidelines, advises financial institutions to move beyond siloed monitoring to adopt a continuous, enterprise-wide approach. These firms must undergo annual audits. Here’s how Tenable can help.
Securing Federal Cloud Environments: Overcoming 5 Key Challenges with Tenable Cloud Security
U.S. government agencies face unique challenges as they adopt cloud technologies to meet digital modernization initiatives and adhere to a cloud-first policy. Here’s how Tenable Cloud Security FedRAMP can help.
Identifying and Securing AI Workloads
Learn why AI workloads demand a new approach to cloud security.
What’s New in Tenable Cloud Security: November Updates in Exposure Management
Tenable Cloud Security delivers critical capabilities to unify security across your entire attack surface. Our latest enhancements let you extend your on-prem vulnerability management program to the cloud; gain granular visibility into external access risk; and discover Snowflake sensitive data.
From Brittle to Scalable: AWS Boosts VPC Perimeter Security with New IAM Keys
AWS has released three new IAM condition keys for VPC endpoints to strictly limit access by specific accounts, organizational units, or AWS Organizations. Learn how these keys help you build scalable security perimeters and reduce manual policy maintenance.
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
Context is key for protecting data in the cloud. Learn how an integrated CNAPP approach moves beyond basic DSPM and takes into account identities, misconfigurations, and AI workloads to pinpoint the greatest risks to your cloud data.