New Google Workspace feature prevents sensitive security changes if two admins don't approve them
09
Apr
2024

New Google Workspace feature prevents sensitive security changes if two admins don’t approve them

Google is rolling out multi-party approvals for Google Workspace customers with multiple super admin accounts, the company has announced. What…

LG Smart TV Vulnerabilities
09
Apr
2024

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

Apr 09, 2024NewsroomVulnerability / IoT Security Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions…

Computer Weekly contributor named Godfather of UK Security
09
Apr
2024

UK plc failing on multiple cyber measures

Half of UK businesses and a little under a third of charities say they have experienced some form of cyber…

CISA Released Advisories to Mitigate LOTL Attack Techniques
09
Apr
2024

CISA Released Advisories to Mitigate LOTL Attack Techniques

In collaboration with international partners, the Cybersecurity and Infrastructure Security Agency (CISA) has released comprehensive advisories to mitigate Living Off…

#MIWIC2024: Illyana Mullins, Founder of WiTCH (Women in Tech and Cyber Hub CIC)
09
Apr
2024

#MIWIC2024: Illyana Mullins, Founder of WiTCH (Women in Tech and Cyber Hub CIC)

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks
09
Apr
2024

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks

A Sandbox is a protective medium that blocks the entire system from any application accessing vulnerable resources.  Restrictive environments for…

91,000 LG TV Devices Vulnerable to Remote Takeover
09
Apr
2024

91,000 Smart LG TV Devices Vulnerable to Remote Takeover

Cybersecurity researchers from Bitdefender discovered critical vulnerabilities in LG TVs running webOS versions 4 through 7. These vulnerabilities could allow…

AI Can ‘Disproportionately’ Help Defend Against Cybersecurity Threats, Google CEO Sundar Pichai Says
09
Apr
2024

Microsoft Threat Intelligence Unveils Targets And Innovative Tactics Amidst Tax Season

09 Apr Microsoft Threat Intelligence Unveils Targets And Innovative Tactics Amidst Tax Season This week in cybersecurity from the editors…

SINEC Security Guard identifies vulnerable production assets
09
Apr
2024

SINEC Security Guard identifies vulnerable production assets

Production facilities are increasingly the target of cyberattacks. Industrial companies are therefore required to identify and close potential vulnerabilities in…

Public worried by police and companies sharing biometric data
09
Apr
2024

Public worried by police and companies sharing biometric data

More than half of the British public are worried about the sharing of biometric data, such as facial recognition, between…

Hackers Using Malware-Driven Scanning To Pinpoint Vulnerabilities
09
Apr
2024

Hackers Using Malware-Driven Scanning To Pinpoint Vulnerabilities

Attackers are now using malware-infected devices to scan target networks instead of directly scanning them. This approach helps them to…

The Role of Identity Data Management in Achieving CISA’S Strategic Goals
09
Apr
2024

The Role of Identity Data Management in Achieving CISA’S Strategic Goals

By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply…