{"id":45419,"date":"2026-04-15T12:41:29","date_gmt":"2026-04-15T04:41:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams\/"},"modified":"2026-04-15T12:41:29","modified_gmt":"2026-04-15T04:41:29","slug":"openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams\/","title":{"rendered":"OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrjpxBjlnOwelWhtbcyO3kBGpQwkfPkbL7RytRsDo26AL5rMz4inD_rjZLSfjy5R6skvnpiOA5M1LoDaAW1bCz4Isy4RMffGJVzgm4kYy5N-V1ijfLhVHefPcneHVGZyXZRjbLZZBHQRe3_QKhKfb5hss3a5hFveU8v2WkKHq-2wUmY_ocysIGGMP8GxdV\/s1600\/gpt.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrjpxBjlnOwelWhtbcyO3kBGpQwkfPkbL7RytRsDo26AL5rMz4inD_rjZLSfjy5R6skvnpiOA5M1LoDaAW1bCz4Isy4RMffGJVzgm4kYy5N-V1ijfLhVHefPcneHVGZyXZRjbLZZBHQRe3_QKhKfb5hss3a5hFveU8v2WkKHq-2wUmY_ocysIGGMP8GxdV\/s1600\/gpt.jpg\" alt=\"OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams\"\/><\/a><\/div>\n<p>OpenAI on Tuesday&nbsp;unveiled <strong>GPT-5.4-Cyber<\/strong>, a variant of its latest flagship&nbsp;model, <a href=\"https:\/\/openai.com\/index\/introducing-gpt-5-4\/\">GPT&#8209;5.4<\/a>, that&#8217;s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier&nbsp;model, <a href=\"https:\/\/thehackernews.com\/2026\/04\/anthropics-claude-mythos-finds.html\">Mythos<\/a>.<\/p>\n<p>&#8220;The progressive use of AI accelerates defenders &#8211; those responsible for keeping systems, data, and users safe &#8211; enabling them to find and fix problems faster in the digital infrastructure everyone relies on,&#8221;&nbsp;OpenAI <a href=\"https:\/\/openai.com\/index\/scaling-trusted-access-for-cyber-defense\/\">said<\/a>.<\/p>\n<p>In conjunction with the announcement, the artificial intelligence (AI) company said it&#8217;s ramping up its Trusted Access for Cyber&nbsp;(<a href=\"https:\/\/openai.com\/index\/trusted-access-for-cyber\/\">TAC<\/a>) program to thousands of authenticated individual defenders and hundreds of teams responsible for securing critical&nbsp;software.<\/p>\n<p>are inherently&nbsp;dual-use systems, as bad actors can repurpose technologies developed for legitimate applications to&nbsp;their own advantage and achieve malicious&nbsp;goals. One core area of concern is that adversaries could invert the models fine-tuned for software defense to detect and exploit vulnerabilities in widely-used software before they&nbsp;can be&nbsp;patched, exposing users to significant&nbsp;risks.<\/p>\n<p>OpenAI said the goal is to democratize access to its models while minimizing such&nbsp;misuse, as well&nbsp;as strengthening its safeguards through a deliberate, iterative&nbsp;rollout. The idea is to enable responsible use at scale, give defenders a head start,&nbsp;and simultaneously shore up guardrails against jailbreaks and adversarial prompt injections as model capabilities become more&nbsp;advanced.<\/p>\n<p>&#8220;As model capabilities advance, our approach is to scale cyber defense in lockstep: broadening access for legitimate defenders while continuing to strengthen safeguards,&#8221; the company&nbsp;added.<\/p>\n<p>The ChatGPT maker, which&nbsp;launched <a href=\"https:\/\/thehackernews.com\/2026\/03\/openai-codex-security-scanned-12.html\">Codex&nbsp;Security<\/a>&nbsp;as a&nbsp;way to find, validate, and propose fixes for vulnerabilities, revealed that the AI-powered application security agent has contributed to over 3,000 critical and&nbsp;high fixed vulnerabilities.<\/p>\n<p>OpenAI&#8217;s limited release follows the preview of Anthropic&#8217;s Mythos, a frontier model&nbsp;that&#8217;s being&nbsp;deployed in a controlled manner as part of Project <b>Glasswing<\/b>. The&nbsp;model, the company said, found &#8220;thousands&#8221; of vulnerabilities in operating systems, web browsers, and other&nbsp;software.<\/p>\n<p>&#8220;The strongest ecosystem is one that continuously identifies, validates, and fixes security issues as&nbsp;software is&nbsp;written,&#8221; OpenAI said. &#8220;By integrating advanced coding models and agentic capabilities into developer workflows, we can give developers immediate, actionable feedback while they are building, shifting security from episodic audits and static bug inventories to ongoing, tangible risk reduction.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI on Tuesday&nbsp;unveiled GPT-5.4-Cyber, a variant of its latest flagship&nbsp;model, GPT&#8209;5.4, that&#8217;s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier&nbsp;model, Mythos.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45419","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45419"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45419\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}