Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»OpenAI Enhances Defensive Models to Mitigate Cyber-Threats
News

OpenAI Enhances Defensive Models to Mitigate Cyber-Threats

Team-CWDBy Team-CWDDecember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A surge in model performance has reshaped OpenAI’s internal planning, the company revealed on Wednesday.

According to a new report, capability assessments using capture the flag (CTF) challenges have shown improvement from 27% on GPT-5 in August 2025 to 76% on GPT-5.1-Codex-Max in November 2025.

OpenAI has warned that some upcoming systems may reach “High” capability levels on its Preparedness Framework, meaning they could eventually assist with tasks ranging from complex intrusion operations to the development of zero-day exploits.

Jon Abbott, co-founder and CEO of ThreatAware, said the warning underscores the need to focus on basic protections.

“OpenAI’s warning that new models pose ‘high’ cybersecurity risks is exactly why getting the security foundations right is absolutely critical. AI might be accelerating the pace of attacks, but our best defense will continue to be nailing the fundamentals first.”

The company also said it is preparing for that possibility by developing layers of safeguards intended to channel advanced capabilities toward defensive outcomes. OpenAI added that its main goal is to strengthen the position of security teams that remain outnumbered and under-resourced.

Strengthening Industry-Wide Understanding

To manage the dual-use risks inherent in cyber workflows, the company outlined a defense-in-depth strategy built on several components:

  • Access controls, infrastructure hardening, egress controls and monitoring

  • Training that steers models away from harmful requests while maintaining usefulness for education and defense

  • System-wide detection tools that can block or reroute unsafe activity

  • End-to-end red teaming by external specialists

“These safeguards are designed to evolve with the threat landscape,” the company said.

Read more on cyberdefense innovation: How to Put Humans at the Forefront of Retail Cyber Defense 

Abbott noted that rising capability makes long-standing threats more dangerous. 

“Old-school threats, when combined with the scale and precision enabled by AI, make for a particularly toxic combination,” he explained.

“With models that can develop working zero-day remote exploits or assist with complex, stealthy intrusions, the barrier to entry for criminals has been dramatically lowered.”

OpenAI said it is coordinating with global experts to improve real-world applications of defensive AI and is preparing a trusted access program for qualifying users.

Another effort, Aardvark, is already in private beta. The agentic security researcher scans codebases, identifies vulnerabilities and proposes patches, and has uncovered new CVEs in open-source projects.

OpenAI said it will also launch a Frontier Risk Council to advise on responsible capability use, with further collaboration through the Frontier Model Forum aimed at refining shared threat models and improving ecosystem-wide mitigation strategies.

Image credit: Prathmesh T / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMalicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
Next Article Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Your information is on the dark web. What happens next?

January 13, 2026

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.