OpenAI rolled out GPT-5.4-Cyber on April 14, a few days after the Mythos limited release. The model is an expansion of OpenAI’s Trusted Access for Cyber program, which gives cybersecurity professionals access to advanced Artificial Intelligence models for defense security tasks. It is a fine-tuned version of GPT-5.4 that enables capabilities such as binary reverse engineering that cyber experts can use to analyze compiled software for potential malware and vulnerabilities. Cyber is only available to vetted security vendors, organizations, and researchers, according to OpenAI.
The launch positions OpenAI against Anthropic’s Claude Mythos, which Anthropic said is too powerful to release widely and is available only to select large companies. Security experts see broader access to GPT-5.4-Cyber as a potential advantage for defenders because more researchers and practitioners can study its capabilities and use it to prepare for cyberattacks. At the same time, wider availability also raises the chance of misuse by malicious actors, leaving open questions about whether the balance of benefit will favor defenders or attackers.
The release adds urgency to long-standing warnings that enterprises need better visibility into their systems and a clearer understanding of what must be secured. Organizations may need to assess whether elements such as IT infrastructure should be updated as the ability to rapidly discover vulnerabilities improves. As bad actors gain faster ways to exploit security holes, enterprises are under greater pressure to remediate weaknesses, strengthen containment strategies, and limit damage if software is compromised.
Analysts also see the arrival of Cyber and Mythos as a signal that cybersecurity teams may need to rethink their broader defense models. More autonomous reliability management and more cost-conscious security operations could become necessary as model capabilities improve. The expectation is that the use of Artificial Intelligence in cybersecurity will rise significantly, with enterprises increasingly relying on these tools to strengthen defenses while adapting to a faster-moving threat landscape.
