{"id":45488,"date":"2026-04-17T04:34:13","date_gmt":"2026-04-16T20:34:13","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/openai-launches-gpt-5-4-cyber-to-boost-defensive-cybersecurity\/"},"modified":"2026-04-17T04:34:13","modified_gmt":"2026-04-16T20:34:13","slug":"openai-launches-gpt-5-4-cyber-to-boost-defensive-cybersecurity","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/openai-launches-gpt-5-4-cyber-to-boost-defensive-cybersecurity\/","title":{"rendered":"OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity"},"content":{"rendered":"\n<p>OpenAI has released GPT-5.4-Cyber, a new version of its flagship AI. This launch comes just one week after Anthropic&#8217;s new AI model <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wolfssl-vulnerability-iot-routers-military-systems\/\">Mythos<\/a> (Claude Mythos) rollout. The new model is a variant of the main GPT-5.4 system, specifically optimized for defensive cybersecurity use cases.<\/p>\n<p>According to <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/openai-macos-certificates-axios-supply-chain-breach\/\">OpenAI&#8217;<\/a>s announcement, the goal is to provide better tools for network and system defenders \u201cresponsible for keeping systems, data, and users safe,\u201d so that they can \u201cfind and fix problems faster.\u201d<\/p>\n<h3><strong>Scaling the Defense Program<\/strong><\/h3>\n<p>Along with the new model, OpenAI is expanding its Trusted Access for Cyber (TAC) program, which first launched in February 2026. This project is now available to thousands of authenticated individual defenders and hundreds of teams responsible for securing critical infrastructure. By providing these professionals with more advanced capabilities, the company wants to help them stay ahead of threat actors who are also experimenting with <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/fake-claude-ai-installer-plugx-malware-windows-users\/\">AI<\/a>.<\/p>\n<p>An integral part of this strategy is the Codex Security tool, which moved into research preview earlier in 2026. OpenAI claims this system has helped identify and patch over 3,000 critical and high-severity vulnerabilities. It does so by monitoring codebases and suggesting fixes before they can be exploited in a cyberattack.<\/p>\n<h3><strong>New Technical Capabilities and Access<\/strong><\/h3>\n<p>The GPT-5.4-Cyber model introduces a much-talked-about new feature called binary reverse engineering. It is especially designed for security experts to help them analyse compiled software to find malware and vulnerabilities, even if they do not have the <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/silverrat-source-code-leaked-online-you-need-to-know\/\">source code<\/a>. This feature has been under development from GPT-5.2 through GPT-5.3-Codex before its official release now.<\/p>\n<p>\u201cCustomers in the highest tiers will get access to GPT\u20115.4\u2011Cyber, a model purposely fine-tuned for additional cyber capabilities and with fewer capability restrictions. This is a version of GPT\u20115.4, which lowers the refusal boundary for legitimate cybersecurity work and enables new capabilities for advanced defensive workflows, including binary reverse engineering capabilities that enable security professionals to analyze compiled software for malware potential, vulnerabilities, and security robustness without needing access to its source code,\u201d the company explained in a detailed <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/openai.com\/index\/scaling-trusted-access-for-cyber-defense\/\">announcement post.<\/a><\/p>\n<p>GPT-5.4-Cyber is more permissive for security tasks, which is why OpenAI is not allowing unrestricted access, and to use the most advanced features, users must first verify their identity. The company uses an authentication process to ensure its software is used by legitimate security professionals and not hackers or espionage actors.<\/p>\n<p>Defenders\/individual users need to sign up to verify themselves at <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/chatgpt.com\/cyber\">chatgpt.com\/cyber<\/a>, whereas enterprises can <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/openai.com\/form\/enterprise-trusted-access-for-cyber\/\">request access<\/a> through their official OpenAI representatives. OpenAI notes that while vulnerabilities in digital systems have existed for years, these new tools can help legitimate actors protect public services and critical infrastructure more profoundly.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>OpenAI plans to continue updating these defensive models throughout 2026. They believe that as AI capabilities grow, the tools used for system defence must also be improved too for enhancing system resilience and keep digital environments secure.<\/p>\n<h3><strong>Industry Expert Reactions<\/strong><\/h3>\n<p>Several industry experts shared their views on this announcement with Hackread.com, noting both the benefits and the remaining hurdles for the sector.<\/p>\n<p>Marcus Fowler, CEO of Darktrace Federal, called the move a positive step but warned about the reality of fixing bugs. He stated, &#8220;Most organisations are still constrained by the realities of remediation once an issue is discovered: patch development, testing, deployment, uptime requirements, and resource limitations. Faster or deeper analysis does not automatically translate to faster or more effective risk reduction.&#8221;<\/p>\n<p>Ronald Lewis from Black Duck highlighted the different styles used by the two tech giants. He noted, &#8220;OpenAI\u2019s TAC framework reflects a more conservative, tool-centric risk posture. It treats advanced cyber capabilities as regulated instruments, suitable for controlled deployment within professional workflows.&#8221; This stands in contrast to Anthropic\u2019s approach, which focuses more on how the model behaves rather than who is allowed to use it.<\/p>\n<p>Photo by BoliviaInteligente on <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/unsplash.com\/photos\/a-black-and-green-logo-on-a-black-background-PeLtf8PCjIY?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience&hellip;\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI has released GPT-5.4-Cyber, a new version of its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45488","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45488"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45488\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}