Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

OpenAI launches a less restricted GPT-5.4 Cyber model

Digest more
Top News
Overview
 · 1d
OpenAI launches GPT-5.4-Cyber model for vetted security pros
OpenAI Group PBC today announced the launch of GPT-5.4-Cyber, a fine-tuned variant of its GPT-5.4 model designed for defensive cybersecurity work and also announced a significant expansion of its Trus...

Continue reading

 · 1d
OpenAI unveils GPT-5.4-Cyber a week after rival's announcement of AI model
eWeek · 13h
OpenAI Debuts GPT-5.4-Cyber, a Locked-Down AI Model for Cyber Defense
Wyoming News · 16h
OpenAI announces restricted-access cybersecurity model
Artificial intelligence company OpenAI said Tuesday that it would release its latest cybersecurity model to a limited number of partners, after rival Anthropic also restricted release of a new system ...

Continue reading

 · 1d
In the Wake of Anthropic’s Mythos, OpenAI Has a New Cybersecurity Model—and Strategy
The Hacker News · 22h
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
Federal News Network
2h

OPM adds cybersecurity jobs to Tech Force hiring program

The new cybersecurity recruitment expansion comes after the loss of thousands of federal tech experts under the Trump administration's workforce reductions.
Decrypt
2d

Anthropic Claude Mythos: Serious Threat or Overhyped? AI Security Institute Weighs In

Claude Mythos could be a potentially massive cybersecurity threat, according to early testing from the UK’s AI Safety Institute.
Bleeping Computer
1y

Cyber agencies share security guidance for network edge devices

Five Eyes cybersecurity agencies in the UK, Australia, Canada, New Zealand, and the U.S. have issued guidance urging makers of network edge devices and appliances to improve forensic visibility to help defenders detect attacks and investigate breaches.
Federal News Network
2d

Why DHS no longer has a compliance mindset for cybersecurity

Hemant Baidwan, the former CISO at DHS and now executive CISO at Knox Systems, said his former agency is doing better to stay ahead of cyber threats.
CPO Magazine
2d

U.S. Federal Agencies Warn of Iranian-Linked Cyber Attacks on Critical Infrastructure Amid Ongoing Conflict

A joint advisory by U.S. federal agencies warns of Iranian-affiliated cyber attacks on critical infrastructure, including energy, water, and government sectors.
CRN
8mon

Palo Alto Networks-CyberArk Combination Would Be ‘Watershed Deal:’ Analyst

The acquisition of a major identity security vendor would provide one of the final missing pieces for Palo Alto Networks’ platform strategy, according to Wedbush’s Daniel Ives. Reported talks that could lead to Palo Alto Networks acquiring CyberArk ...
7d

Cybersecurity Is the New Infrastructure: CCN Report Finds Digital Trust Now Determines Who Gets to Compete

TORONTO, April 8, 2026 /PRNewswire/ -- The Canadian Cybersecurity Network (CCN) today released a new CCN Insights report, Cybersecurity Is the New Infrastructure: Why Digital Trust Now Determines Who Gets to Compete, highlighting a fundamental shift in how businesses access markets, secure insurance, and participate in the digital economy.
Michigan Technological University
9mon

Online Master of Science in Cybersecurity (MS)

Help Fill the Talent Gap for Skilled Cybersecurity Professionals. Cybersecurity, the crucial practice of protecting computer systems, networks, programs, and data from digital attacks, is needed NOW more than ever. Between 2018 and 2022, in fact, the ...
24/7 Wall St. on MSN
7h

Why cybersecurity stocks look built for the next big spending cycle

Palo Alto Networks (PANW) are positioned to benefit from enterprise cybersecurity spending as AI threats escalate; both CRWD and PANW are equipped with AI capabilities to compete in the emerging AI-driven cyber warfare landscape.
13h

Rolling Networks: Securing the Transportation Sector

Modern trucks are rolling networks packed with sensors, connectivity, and attack surfaces, creating new cyber risks. NMFTA's Cybersecurity Conference brings industry leaders together to tackle emerging threats in transportation.
  • Privacy
  • Terms