{"id":601,"date":"2026-04-15T06:36:24","date_gmt":"2026-04-15T06:36:24","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=601"},"modified":"2026-04-15T06:36:24","modified_gmt":"2026-04-15T06:36:24","slug":"openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=601","title":{"rendered":"OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 15, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Secure Coding<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrjpxBjlnOwelWhtbcyO3kBGpQwkfPkbL7RytRsDo26AL5rMz4inD_rjZLSfjy5R6skvnpiOA5M1LoDaAW1bCz4Isy4RMffGJVzgm4kYy5N-V1ijfLhVHefPcneHVGZyXZRjbLZZBHQRe3_QKhKfb5hss3a5hFveU8v2WkKHq-2wUmY_ocysIGGMP8GxdV\/s1700-e365\/gpt.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>OpenAI on Tuesday\u00a0unveiled <strong>GPT-5.4-Cyber<\/strong>, a variant of its latest flagship\u00a0model, <a href=\"https:\/\/openai.com\/index\/introducing-gpt-5-4\/\">GPT\u20115.4<\/a>, that&#8217;s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier\u00a0model, Mythos.<\/p>\n<p>\u00abThe progressive use of AI accelerates defenders \u2013 those responsible for keeping systems, data, and users safe \u2013 enabling them to find and fix problems faster in the digital infrastructure everyone relies on,\u00bb\u00a0OpenAI <a href=\"https:\/\/openai.com\/index\/scaling-trusted-access-for-cyber-defense\/\">said<\/a>.<\/p>\n<p>In conjunction with the announcement, the artificial intelligence (AI) company said it&#8217;s ramping up its Trusted Access for Cyber\u00a0(<a href=\"https:\/\/openai.com\/index\/trusted-access-for-cyber\/\">TAC<\/a>) program to thousands of authenticated individual defenders and hundreds of teams responsible for securing critical\u00a0software.<\/p>\n<p>AI systems are inherently dual-use, as bad actors can repurpose technologies developed for legitimate applications to\u00a0their own advantage and achieve malicious\u00a0goals. One core area of concern is that adversaries could invert the models fine-tuned for software defense to detect and exploit vulnerabilities in widely-used software before they\u00a0can be\u00a0patched, exposing users to significant\u00a0risks.<\/p>\n<p>OpenAI said the goal is to democratize access to its models while minimizing such\u00a0misuse, as well\u00a0as strengthening its safeguards through a deliberate, iterative\u00a0rollout. The idea is to enable responsible use at scale, give defenders a head start,\u00a0and simultaneously shore up guardrails against jailbreaks and adversarial prompt injections as model capabilities become more\u00a0advanced.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abAs model capabilities advance, our approach is to scale cyber defense in lockstep: broadening access for legitimate defenders while continuing to strengthen safeguards,\u00bb the company\u00a0added.<\/p>\n<p>The ChatGPT maker, which\u00a0launched Codex\u00a0Security\u00a0as a\u00a0way to find, validate, and propose fixes for vulnerabilities, revealed that the AI-powered application security agent has contributed to over 3,000 critical and\u00a0high fixed vulnerabilities.<\/p>\n<p>OpenAI&#8217;s limited release follows the preview of Anthropic&#8217;s Mythos, a frontier model\u00a0that&#8217;s being\u00a0deployed in a controlled manner as part of Project <b>Glasswing<\/b>. The\u00a0model, the company said, found \u00abthousands\u00bb of vulnerabilities in operating systems, web browsers, and other\u00a0software.<\/p>\n<p>\u00abThe strongest ecosystem is one that continuously identifies, validates, and fixes security issues as\u00a0software is\u00a0written,\u00bb OpenAI said. \u00abBy integrating advanced coding models and agentic capabilities into developer workflows, we can give developers immediate, actionable feedback while they are building, shifting security from episodic audits and static bug inventories to ongoing, tangible risk reduction.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 15, 2026Vulnerability \/ Secure Coding OpenAI on Tuesday\u00a0unveiled GPT-5.4-Cyber, a variant of its latest flagship\u00a0model, GPT\u20115.4, that&#8217;s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic&hellip;<\/p>\n","protected":false},"author":1,"featured_media":602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[130,1225,1224,188,512,47,756],"class_list":["post-601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-access","tag-expanded","tag-gpt5-4cyber","tag-launches","tag-openai","tag-security","tag-teams"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=601"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/602"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}