None
<p>The post <a href="https://www.youtube-nocookie.com/embed/J9B6Ez2ynvk?si=qGR9vaIZhD_CQc92">[un]prompted 2026 – Securing Workspace GenAl At Google Speed</a> appeared first on <a href="https://www.infosecurity.us/">Infosecurity.US</a>.</p><p></p><center data-preserve-html-node="true">Author, Creator & Presenter: Nicolas Lidzborski, Principal Engineer At Google Workspace Security
<p></p><center data-preserve-html-node="true"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" src="https://www.youtube-nocookie.com/embed/J9B6Ez2ynvk?si=qGR9vaIZhD_CQc92" width="560" frameborder="0" data-preserve-html-node="true" title="YouTube video player" height="315"></iframe>
<hr>
<p>Our thanks to <a href="https://unpromptedcon.org/">[un]prompted</a> for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the <a href="https://unpromptedcon.org/">Organizations’</a> <a href="https://www.youtube.com/@un_prompted">YouTube Channel</a>. </p>
<p></p></center></center><p><a href="https://www.infosecurity.us/blog/2026/4/25/unprompted-2026-securing-workspace-genal-at-google-speed">Permalink</a></p><p>
</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/unprompted-2026-securing-workspace-genal-at-google-speed/" data-a2a-title="[un]prompted 2026 – Securing Workspace GenAl At Google Speed"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Funprompted-2026-securing-workspace-genal-at-google-speed%2F&linkname=%5Bun%5Dprompted%202026%20%E2%80%93%20Securing%20Workspace%20GenAl%20At%20Google%20Speed" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Funprompted-2026-securing-workspace-genal-at-google-speed%2F&linkname=%5Bun%5Dprompted%202026%20%E2%80%93%20Securing%20Workspace%20GenAl%20At%20Google%20Speed" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Funprompted-2026-securing-workspace-genal-at-google-speed%2F&linkname=%5Bun%5Dprompted%202026%20%E2%80%93%20Securing%20Workspace%20GenAl%20At%20Google%20Speed" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Funprompted-2026-securing-workspace-genal-at-google-speed%2F&linkname=%5Bun%5Dprompted%202026%20%E2%80%93%20Securing%20Workspace%20GenAl%20At%20Google%20Speed" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Funprompted-2026-securing-workspace-genal-at-google-speed%2F&linkname=%5Bun%5Dprompted%202026%20%E2%80%93%20Securing%20Workspace%20GenAl%20At%20Google%20Speed" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.youtube-nocookie.com/embed/J9B6Ez2ynvk?si=qGR9vaIZhD_CQc92">https://www.youtube-nocookie.com/embed/J9B6Ez2ynvk?si=qGR9vaIZhD_CQc92</a> </p>
Raymond Chen published a blog post about how a crappy uninstaller on Windows caused a mysterious spike in the number of Explorer (Windows’ graphical shell) crashes. It turns out the buggy uninstaller caused repeated crashes in the 32bit version of Explorer on…
Raymond Chen published a blog post about how a crappy uninstaller on Windows caused a mysterious spike in the number of Explorer (Windows’ graphical shell) crashes. It turns out the buggy uninstaller… [+1835 chars]
A white-dial automatic that tracks two time zones, now available outside Japan.
Editor’s Note
The field watch was born in the trenches of World War I, when soldiers needed to read the time without reaching into a pocket. Over a century later, Seiko's 5 Sports Field GMT SSK059 c… [+508 chars]
HelloBaby 1000′ Transmission Video Baby Monitor For $19.99 From Amazon This was selling for $34.04 and is now the lowest price ever from Amazon. The Safer Baby Monitor with 2.4GHz FHSS technology, no WiFi connection, avoids hacking risks and ensures privacy 9…
Advertiser Disclosure: Many of the links that appear on this site are from companies from which DansDeals.com receives compensation. Dan’s Deals LLC is a participant in the Amazon Services LLC Associ… [+1486 chars]
Have you noticed all the folks bragging about the cool new tools they’ve hacked up using AI? In the last month or so, I’ve read newsletters from half a dozen or so people detailing vibe-coded apps that help them do research, organize their life, or even build…
Back in the day.
Have you noticed all the folks bragging about the cool new tools they’ve hacked up using AI? In the last month or so, I’ve read newsletters from half a dozen or so people detailing … [+4252 chars]
ELBERTON, Ga., April 24, 2026 (GLOBE NEWSWIRE) -- Vallant Financial, Inc. (OTCQX: VLNT) (“Vallant”), the holding company of Vallant Bank, today announced its results of operations for the quarter ended March 31, 2026. Vallant also announced the results of ope…
ELBERTON, Ga., April 24, 2026 (GLOBE NEWSWIRE) -- Vallant Financial, Inc. (OTCQX: VLNT) (Vallant), the holding company of Vallant Bank, today announced its results of operations for the quarter ended… [+8213 chars]
Today on the show I’m talking with Amelia Wattenberger — designer, data-viz veteran, ex-GitHub Next, and now designing Intent at Augment Code. What if the last 30% of any software project is about to become the hardest part you’ve ever done? That’s the argume…
WorkOS Auth for CLI with AuthKit from WorkOS Bring secure browser-based login to your terminal apps using the OAuth Device Flow, with the same polished AuthKit experience plus SSO, MFA, and passkeys.… [+915 chars]
A mobile pass is that thing in your iPhone's Wallet app. A boarding pass, a concert ticket, a coffee loyalty card, a gym membership. Apple calls them passes. Google calls them objects. Both Wallet apps let you generate them, hand them out, and push live updat…
A mobile pass is that thing in your iPhone's Wallet app. A boarding pass, a concert ticket, a coffee loyalty card, a gym membership. Apple calls them passes. Google calls them objects. Both Wallet ap… [+7134 chars]
‘Pack2TheRoot’ flaw lets local Linux users gain root via PackageKit. CVE-2026-41651 (8.8) has existed for nearly 12 years. The Pack2TheRoot flaw, tracked as CVE-2026-41651, lets unprivileged users install or remove system packages without authorization, poten…
12-year-old Pack2TheRoot bug lets Linux users gain root privileges
The Pack2TheRoot flaw, tracked as CVE-2026-41651, lets unprivileged users install or remove system packages without authorization, … [+2970 chars]
Following Paramount Skydance's move to launch an investigation into how its upcoming Avatar Aang: The Last Airbender animated feature leaked onto the internet, a suspect has been taken into custody by police. The Straits Times reports Singaporean police have …
<ul><li></li><li></li><li></li></ul>
Singaporean police say the suspect was able to obtain the film through unauthorized remote access to a server.
Singaporean police say the suspect was able to ob… [+4639 chars]
"The Matrix" and "Hackers" may be the most remembered hacking movies of the '90s, but this funny yet tense Robert Redford gem deserves a wider audience.
The '90s were a special time, with hacking themes abound. The internet was still new and hadn't yet been taken over by corporations. Computing still had a positive mystique around it as something fre… [+1545 chars]
Singapore's 'The Straits Times' reports a suspect accessed a studio server and spread the film online. He could face 7 years and/or a $50,000 fine.
The online leak of Paramounts upcoming The Legend of Aang: The Last Airbender has taken a serious turn into real-world consequences. Singapore police have arrested a 26-year-old man accused of hackin… [+2142 chars]
The White House Office of Science and Technology Policy (OSTP) on Thursday published a memo that accused China of conducting “industrial-scale” theft of artificial intelligence (AI) technology from American firms.
The post White House Accuses China of ‘Delibe…
The White House Office of Science and Technology Policy (OSTP) on Thursday published a memo that accused China of conducting industrial-scale theft of artificial intelligence (AI) technology from Ame… [+5822 chars]
The Friday afternoon collection of Android game and app price drops has now arrived, featuring titles like Lia: Hacking Destiny, Ash of Gods: Redemption, Boxville 2, Guardian War: Ultimate Edition, Outliver: Tribulation, and more. On your way down scope out t…
The Friday afternoon collection of Android game and app price drops has now arrived, featuring titles like Lia: Hacking Destiny, Ash of Gods: Redemption, Boxville 2, Guardian War: Ultimate Edition, O… [+282 chars]
by guest blogger Kieran McCarthy After the Supreme Court’s first and only CFAA decision in Van Buren v. US in 2021, I wrote that the Court “could have done 10% more work here and provided clarity on very key questions….[but...
The post Tenth Circuit Broadens …
by guest blogger Kieran McCarthy
After the Supreme Court’s first and only CFAA decision in Van Buren v. US in 2021, I wrote that the Court “could have done 10% more work here and provided clarity on … [+14307 chars]
While there will most likely be questions remaining about the hack/leak of Paramount+'s Legend of Aang: The Last Airbender, it appears the person who may have set all of this in motion has been arrested. In case you need catching up, an individual took to soc…
Posted in: Movies, Paramount+, TV | Tagged: avatar, Avatar The Last Airbender
Report: A suspect was arrested in the hack/leak of Legend of Aang: The Last Airbender, Paramount+'s "Avatar: The Last Ai… [+5192 chars]
Common stock begins trading on the OTCQB under the symbol "ASNS" effective April 24, 2026; Company continues to execute across federal, transportation, utilities and telecom markets as it evaluates options to relist on Nasdaq Common stock begins trading on th…
SUNNYVALE, Calif., April 24, 2026 (GLOBE NEWSWIRE) -- Actelis Networks, Inc. (OTCQB: ASNS) ("Actelis" or the "Company"), a market leader in cyber-hardened, rapid-deployment networking solutions for I… [+4127 chars]
Friday’s lineup of the best iOS game and app deals has arrived, including highlights like Lia: Hacking Destiny, Ash of Gods: Redemption, Golden Enigma, To the Moon, Juicy Realm, Rush Rally Origins, and more. This morning we also spotted Apple’s most affordabl…
Friday’s lineup of the best iOS game and app deals has arrived, including highlights like Lia: Hacking Destiny, Ash of Gods: Redemption, Golden Enigma, To the Moon, Juicy Realm, Rush Rally Origins, a… [+402 chars]
Qubic says it has fully transitioned into its Dogecoin-focused mining architecture, marking the start of “Phase 3” and removing Monero (XMR) from its operational stack. The shift consolidates resources into a dual-track system that simultaneously mines Dogeco…
Qubic says it has fully transitioned into its Dogecoin-focused mining architecture, marking the start of Phase 3 and removing Monero (XMR) from its operational stack. The shift consolidates resources… [+3590 chars]
If you are planning to create an online casino or a copy of OnlyFans, you most likely want to get in quickly, make money fast, and get out. You are unlikely to stick with it for 10 years. Just as many criminals hope to pull off one last heist, earn a living, …
If you are planning to create an online casino or a copy of OnlyFans, you most likely want to get in quickly, make money fast, and get out. You are unlikely to stick with it for 10 years. Just as man… [+5483 chars]
Silicon Valley venture capitalists are wining and dining 18-year-olds.
When I was a freshman at Stanford University, I learned to shotgun a beer from a guy in a frat. Soon after, he dropped out and started an AI company. Six months later, it was valued at more than $1 b… [+24977 chars]
A recent CISA advisory was a blunt reminder that, in the digital age, the battlefield has expanded to encompass the geography of everyday life. Sue Halpern writes.
To be clear, in this country, this is still the stuff of B-list thrillers. As Alex K. Jones, who chairs the department of electrical engineering and computer science at Syracuse University, told me, … [+4588 chars]
Bitwarden CLI was hit by the Checkmarx supply chain attack. Version 2026.4.0 shipped malicious code in bw1.js via a compromised GitHub Action. Bitwarden CLI has been compromised as part of the ongoing Checkmarx supply chain campaign, researchers warn. The aff…
Checkmarx supply chain attack impacts Bitwarden npm distribution path
Bitwarden CLI has been compromised as part of the ongoing Checkmarx supply chain campaign, researchers warn. The affected versio… [+5102 chars]
Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for …
Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the … [+2424 chars]
UK National Cyber Security Centre (NCSC) warns China-linked hackers use hijacked devices as proxy networks to hide activity and evade detection. UK National Cyber Security Centre (NCSC) and global partners warn that China-linked threat actors now rely on larg…
China-linked threat actors use consumer device botnets to evade detection, warn UK and partners
UK National Cyber Security Centre (NCSC) and global partners warn that China-linked threat actors now … [+5103 chars]