News

Help Net Security
helpnetsecurity.com > 03/08/2026 > week-in-review-weaponized-oauth-redirection-logic-delivers-malware-patch-tuesday-forecast

Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

2+ hour, 10+ min ago  (1425+ words) Here's an overview of some of last week's most interesting news, articles, interviews and videos: BlacksmithAI: Open-source AI-powered penetration testing framework BlacksmithAI is an open-source penetration testing framework that uses multiple AI agents to execute different stages of a security…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > microsoft-teams-third-party-bot-identification

Microsoft working on Teams feature to help admins block unauthorized bots

1+ day, 21+ hour ago  (247+ words) Microsoft plans to add a new Teams feature that lets meeting admins identify and control third-party bots before they join. According to the Microsoft 365 Roadmap, the feature is scheduled to begin rolling out in May 2026 on Desktop, Mac, Linux, iOS,…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > risc-2-0-cybersecurity-module-healthcare-organizations

New cyber module strengthens risk planning for health organizations

2+ day, 30+ min ago  (263+ words) The Administration for Strategic Preparedness and Response's (ASPR) new cybersecurity module in the Risk Identification and Site Criticality (RISC) 2.0 Toolkit helps organizations identify critical gaps, prioritize investments, and make informed decisions about risk mitigation to reduce disruptions to patient care…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > cyolo-pro-v7-0

Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence

2+ day, 2+ hour ago  (534+ words) Cyolo has released Cyolo PRO (Privileged Remote Operations) v7.0, a major update that expands OT-first secure remote access and strengthens protection for critical infrastructure and industrial environments without disrupting operations. Secure remote access (SRA) tools focus primarily on managing access. Cyolo…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > cursor-automations-turns-code-review-and-ops-into-background-tasks

Cursor Automations turns code review and ops into background tasks

2+ day, 2+ hour ago  (251+ words) Cursor Automations, the always-on agent platform from Cursor, is expanding with a new generation of autonomous systems that streamline code review, incident response, and other engineering workflows. "Automations are great for reviewing changes. They can catch and fix everything from…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > openai-chatgpt-gpt%E2%80%915-4-model-release

OpenAI’s GPT-5.4 doubles down on safety as competition heats up

2+ day, 2+ hour ago  (425+ words) In the midst of recent developments and controversies surrounding a contract with the U.S. Department of Defense, OpenAI released the GPT-5.4 model. The release comes at a time when users are reportedly leaving ChatGPT for rival chatbots, particularly Anthropic's Claude. GPT…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > march-2026-patch-tuesday-forecast

March 2026 Patch Tuesday forecast: Is AI security an oxymoron?

2+ day, 3+ hour ago  (307+ words) Developers and analysts are using more AI tools to produce code and to test both the performance and security of the finished products. They are also embedding AI functionality in their products directly. But just how secure are these AI…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > why-phishing-still-works-today

Why phishing still works today

2+ day, 4+ hour ago  (142+ words) In this Help Net Security video, Gal Livschitz, Senior Penetration Tester at Terra Security, explains how phishing has evolved and why employees still fall for it. He outlines how phishing now uses HTTPS, branded pages, and lookalike domains, making attacks…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > global-coalition-telecoms-6g-security-resilience-principles

Western governments lay the groundwork for secure 6G networks

2+ day, 5+ hour ago  (256+ words) Governments are preparing for 6G, the next generation of mobile networks, placing security and resilience among their top priorities. In response, seven countries participating in the Global Coalition on Telecoms (GCOT) have introduced a set of 6G Security and Resilience Principles, developed…...

Help Net Security
helpnetsecurity.com > 03/06/2026 > cybersecurity-competition-ai-vs-human-hackers

What happens when AI teams compete against human hackers

2+ day, 5+ hour ago  (382+ words) A cybersecurity competition produced what may be the largest controlled dataset comparing AI-augmented teams to human-only teams on professional-grade offensive security tasks. AI-augmented teams completed challenges at a significantly higher rate than human-only teams, with roughly 73 percent finishing at least…...