Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sentinel Clear Filter

How Microsoft Sentinel is tackling the AI cybersecurity era

Andriy Onufriyenko/Moment via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways AI has created new cybersecurity threats as well as solutions. Sentinel is now able to respond to threats more autonomously. Microsoft is capitalizing on the industry's period of transition. The rise of AI is reshaping cybersecurity, presenting both new threats and new tools for mitigating them. Microsoft has been seizing this moment of transformation, aiming to become cyb

Roblox Rolls Out System to Spot Child-Endangerment Chat Messages

Roblox is a popular online gaming platform for children. But it's also a place where people who want to exploit children know they can find an audience. On Thursday, Roblox announced Roblox Sentinel, an artificial intelligence system that's designed to flag inappropriate messages in its chat feature. Roblox already prohibits sharing real-world images and personal information, like phone numbers and usernames. The company hopes Sentinel will flag more messages sooner for investigation. It's been

New macOS malware targets crypto and Web3 startups with fake Zoom update

North Korean hackers are behind a new and unusually sophisticated macOS malware campaign that targets the crypto industry using fake Zoom invites. Here’s how it works. Dubbed “NimDoor” by researchers at SentinelLabs, the attack is more sophisticated than the typical macOS threat, and it chains together AppleScript, Bash, C++, and Nim to exfiltrate data and maintain access in compromised systems. Here’s SentinelLabs’ executive summary of the hack: DPRK threat actors are utilizing Nim-compiled

NimDoor crypto-theft macOS malware revives itself when killed

North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. Researchers analyzing the payloads discovered that the attacker relied on unusual techniques and a previously unseen signal-based persistence mechanism. The attack chain, which involves contacting victims via Telegram and luring them into running a fake Zoom SDK update, delivered via Calendly and email, resembles the one Huntress manag