Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

OpenAI unveils GPT-5.4-Cyber

Digest more
Top News
Overview
eWeek · 12h
OpenAI Debuts GPT-5.4-Cyber, a Locked-Down AI Model for Cyber Defense
OpenAI launches GPT-5.4-Cyber with selective access for verified defenders, adding a cyber-focused model and tighter controls for high-risk use.

Continue reading

 · 17h · on MSN
OpenAI follows Anthropic's lead in limited release of GPT‑5.4‑Cyber
 · 21h
OpenAI unveils GPT-5.4-Cyber a week after rival's announcement of AI model
Wyoming News · 15h
OpenAI announces restricted-access cybersecurity model
Artificial intelligence company OpenAI said Tuesday that it would release its latest cybersecurity model to a limited number of partners, after rival Anthropic also restricted release of a new system ...

Continue reading

 · 1d
In the Wake of Anthropic’s Mythos, OpenAI Has a New Cybersecurity Model—and Strategy
The Hacker News · 21h
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
13hon MSN

Boy arrested following cyber attack on school IT system

The IT system used by schools, called C2K, had been targeted in a cyber attack at the start of the school Easter break.
7d

Aviation MRO Under Siege: How the Industry Is Defending Against Rising Cyber Threats

As cyberattacks on aviation MRO increase, the industry's highly interconnected systems make it a prime target for
pv magazine International
18h

Cyber threats for PV: What are credential compromise attacks and how do they work

Credential compromise attacks allow adversaries to gain unauthorized access to PV systems by stealing or guessing valid login credentials, enabling them to manipulate operations, disrupt monitoring, or take control of critical assets.
Nextgov
8h

Expect more cybersecurity executive orders soon, national cyber director says

Sean Cairncross also said that his office and others in the administration are in touch with AI and tech companies following Anthropic’s Project Glasswing announcement.
Hoodline
8d

Cyber Chaos at Brockton Hospital Sends Ambulances Scrambling, Shutters Pharmacies

Brockton Hospital pulled key computer systems offline Monday after what officials are calling a cybersecurity incident, a move that triggered ambulance diversions and pushed staff back to old-school paper charts. Inpatient care and the walk-in emergency department stayed open, but the outage disrupted some outpatient visits and pharmacy services.
6don MSN

U.S. Treasury to share cyber alerts with eligible exchanges

The U.S. Treasury will share cyber alerts with digital asset exchanges.
2d

CRI Cyber Profile: A complete guide for financial institutions

Vanta reports on the CRI Cyber Profile, a framework for financial institutions to streamline compliance with global cybersecurity regulations.
pv magazine USA
2d

Managing cyber risks in the era of decentralized energy

The move toward decentralized energy resources offers resilience and flexibility in power generation, but it also introduces new complexities that demand proactive security measures.
2hon MSN

Alabama cyber crime report: Teens lost $52,000 to scammers in 2025

The FBI warns of rising sextortion and phishing targeting minors as the state loses $167 million to internet crimes.
SpaceNews
10h

Rethinking cyber and space with Joe Mazur

In this episode of Space Minds, Mike Gruss talks with Nightwing’s Joe Mazur to discuss the intersection of cyber and space. They chat about the acceleration of cyber operations, the role of offensive cyber capabilities and how acquisition is evolving.
  • Privacy
  • Terms