{"id":7460,"date":"2026-04-19T15:31:40","date_gmt":"2026-04-19T13:31:40","guid":{"rendered":"https:\/\/yoota.it\/en\/openai-rolls-out-specialized-cyber-defense-model-as-arms-race-with-anthropic-heats-up\/"},"modified":"2026-04-19T15:31:41","modified_gmt":"2026-04-19T13:31:41","slug":"openai-rolls-out-specialized-cyber-defense-model-as-arms-race-with-anthropic-heats-up","status":"publish","type":"post","link":"https:\/\/yoota.it\/en\/openai-rolls-out-specialized-cyber-defense-model-as-arms-race-with-anthropic-heats-up\/","title":{"rendered":"OpenAI Rolls Out Specialized Cyber Defense Model as Arms Race With Anthropic Heats Up"},"content":{"rendered":"\n<p>A week after Anthropic unveiled Project Glasswing, OpenAI has introduced GPT-5.4-Cyber, a variant of its GPT-5.4 model built specifically for defensive cybersecurity work. Access isn&#8217;t open to everyone. You need to reach the upper tiers of OpenAI&#8217;s Trusted Access for Cyber (TAC) program, which launched in February alongside a ten-million-dollar fund for cybersecurity initiatives.<\/p>\n\n\n\n<p>The key difference: the model has a lower refusal threshold than standard versions. Normally, requests about analyzing vulnerabilities, understanding malware behavior, or researching exploits get blocked even when security professionals ask. GPT-5.4-Cyber is calibrated to handle these requests, provided the user has cleared TAC&#8217;s verification checks.<\/p>\n\n\n\n<p>There&#8217;s also a new capability for analyzing compiled binary code. This lets researchers examine applications and software for vulnerabilities or malicious behavior without needing the source code. OpenAI frames this as a stepping stone toward even more capable systems expected later in the year.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Data Problem<\/h2>\n\n\n\n<p>There&#8217;s a catch worth noting. According to The Next Web, accessing the highest TAC tier, which unlocks GPT-5.4-Cyber, means giving up Zero Data Retention. OpenAI keeps session logs, which gives the company visibility into which vulnerabilities get analyzed, which systems get probed, and which exploits get discussed. For teams working on critical or classified infrastructure, this trade-off might conflict with operational security requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How It Compares to Anthropic<\/h2>\n\n\n\n<p>OpenAI is explicitly positioning itself as the more accessible option. Anthropic took a more restrictive approach with Project Glasswing, limiting Claude Mythos access to a small handful of large organizations. OpenAI&#8217;s pitch centers on broader distribution as a collective defense argument. CyberScoop reports the company says it wants to avoid arbitrarily deciding who gets access for legitimate uses, relying instead on identity verification as the gating mechanism.<\/p>\n\n\n\n<p>How sustainable this relative openness remains is an open question. US and British security experts have already flagged Claude Mythos as having significant offensive potential, which partly explains Anthropic&#8217;s decision to restrict access. GPT-5.4-Cyber follows a similar path, with a wider audience but still gatekept.<\/p>\n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/openai.com\/index\/scaling-trusted-access-for-cyber-defense\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        openai.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/cyberscoop.com\/openai-expands-trusted-access-for-cyber-to-thousands-for-cybersecurity\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        cyberscoop.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/thenextweb.com\/news\/openai-gpt-5-4-cyber-trusted-access-defenders-mythos\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        thenextweb.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/www.axios.com\/2026\/04\/14\/openai-model-cyber-program-release\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        axios.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI launched GPT-5.4-Cyber, a specialized variant designed for verified cybersecurity professionals. It arrives days after Anthropic announced Claude Mythos, sparking competition over who controls access to powerful AI security tools.<\/p>\n","protected":false},"author":2,"featured_media":7459,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"italian_url":"https:\/\/yoota.it\/dopo-anthropic-anche-openai-lancia-un-modello-ai-dedicato-alla-sicurezza-informatica-difensiva\/","yoota_meta_description":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[41],"tags":[273,302,274],"class_list":["post-7460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-llm","tag-artificial-intelligence","tag-cybersecurity","tag-openai"],"_links":{"self":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/comments?post=7460"}],"version-history":[{"count":1,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7460\/revisions"}],"predecessor-version":[{"id":7462,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7460\/revisions\/7462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media\/7459"}],"wp:attachment":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media?parent=7460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/categories?post=7460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/tags?post=7460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}