Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake

Sep 30, 2025Ravie LakshmananArtificial Intelligence / Threat Detection Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution (SIEM) as a unified agentic platform with the general availability of the Sentinel data lake. In addition, the tech giant said it’s also releasing a public preview of Sentinel Graph and Sentinel […]

Continue Reading

New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting “active senior trips.” Some […]

Continue Reading

Evolving Enterprise Defense to Secure the Modern AI Supply Chain

Sep 30, 2025The Hacker NewsArtificial Intelligence / Data Protection The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This […]

Continue Reading

OpenAI Introduces Parental Controls for Minor ChatGPT Users, Lets Parents Link Accounts

OpenAI has rolled out new parental controls for ChatGPT, weeks after first announcing them in response to concerns around minors’ safety. The controls let parents link accounts with teenagers, restrict features like Voice Mode and image generation, and set Quiet Hours. All teen accounts also get stricter safeguards by default, with OpenAI also building distress […]

Continue Reading

CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

Sep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility for Linux and Unix-like operating systems to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE-2025-32463 (CVSS score: […]

Continue Reading