OpenAI Launches Interface Canvas For Writing And Coding Projects - 1

OpenAI Launches Interface Canvas For Writing And Coding Projects

  • Written by Andrea Miliani Former Tech News Expert
  • Fact-Checked by Justyn Newman Former Lead Cybersecurity Editor

In a Rush? Here are the Quick Facts!

  • OpenAI rolled out yesterday the beta version of Canvas for ChatGPT Plus and Team users across the globe
  • The new interface has been designed to assist and improve writing and coding projects
  • ChatGPT has a better context comprenhension and automatically opens Canvas to help users

OpenAI introduced a new interface for working with ChatGPT called Canvas yesterday. The new feature has been designed for writing and coding projects and its beta version already started to roll out for ChatGPT Plus and Team users across the globe.

With Canvas, ChatGPT will have a better understanding of the context as the bot will be able to recognize highlighted text or code that needs editing and it can help provide feedback or suggestions or specific segments.

“Canvas opens automatically when ChatGPT detects a scenario in which it could be helpful,” states the document shared by the startup. “You can also include ‘use canvas’ in your prompt to open canvas and use it to work on an existing project.”

OpenAI provided more details on the development and testing of Canvas—including the training and the challenges faced—, and shared multiple videos and examples on how to make the most of the feature.

A few X users shared a few thoughts on the new interface. “Here it comes, this will be by far the biggest ChatGPT update for this year,” wrote one user. “I love this feature. I’m already finding it useful to examine and discuss text I’ve written, and to explain segments of code that I’m not familiar with,” added another.

This week, OpenAI also announced new features for developers who want to build new products using the company’s APIs.

Cyberattacks On Critical Infrastructures Drive Major Financial Losses - 2

Image by DC studio, from Freepik

Cyberattacks On Critical Infrastructures Drive Major Financial Losses

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Justyn Newman Former Lead Cybersecurity Editor

In a Rush? Here are the Quick Facts!

  • Ransomware attacks and payments remain widespread.
  • Nearly 45% reported financial losses exceeding $500,000 from CPS cyberattacks.
  • Ransomware remains a significant issue, especially in the healthcare sector.

A new global survey, conducted by the cybersecurity company Claroty , highlights the rising financial and operational impacts of cyberattacks on critical infrastructure systems. The survey of 1,100 cybersecurity professionals revealed that cyber-physical systems (CPS) are increasingly being targeted.

This includes operational technology (OT), Internet of Things (IoT), medical devices (IoMT), and building management systems (BMS), leading to major financial losses and operational disruptions.

In light of these rising threats, cybersecurity professionals are facing unprecedented strain as the frequency of cyberattacks increases and AI complicates the threat landscape.

One of the report’s key findings is that nearly half of respondents (45%) reported financial damages exceeding $500,000 USD due to cyberattacks on CPS in the past year, with 27% experiencing losses of $1 million or more.

The sectors most affected include chemical manufacturing, energy, and mining, where over 50% of respondents reported losses over $500,000. Contributing factors include lost revenue, recovery costs, and employee overtime.

Ransomware continues to pose a major challenge, especially for the healthcare sector. Over half of the respondents (53%) indicated paying more than $500,000 USD to meet ransom demands in order to regain access to encrypted systems.

Hospitals and other healthcare facilities have been particularly vulnerable, with 78% of healthcare organizations reporting ransom payments over this amount.

Operational disruptions caused by cyberattacks have also been widespread. Almost half of the respondents (49%) experienced over 12 hours of downtime in the past year, with a third (33%) reporting at least one full day of disruption.

For many, the recovery process is lengthy—29% said it took over a month to fully recover from incidents. Process manipulation and disruption were among the most commonly reported effects of these attacks.

Remote access and supply chain vulnerabilities are another major concern. With 45% of CPS assets now connected to the internet, reliance on virtual private networks (VPNs) without CPS-specific security measures is growing.

Third-party supplier access to CPS environments is a significant entry point for attacks, with 82% of respondents reporting at least one incident originating from such access in the past year.

Despite these challenges, there is growing optimism about CPS resilience. Over half of the respondents (56%) expressed confidence in their organization’s ability to withstand future attacks, with 72% expecting improvements in CPS security over the next year.