{"id":58089,"date":"2025-01-31T19:43:00","date_gmt":"2025-01-31T19:43:00","guid":{"rendered":"http:\/\/dcbc2e20-2fd2-4911-98e7-619397d07df7"},"modified":"2025-01-31T19:43:00","modified_gmt":"2025-01-31T19:43:00","slug":"deepseeks-ai-model-proves-easy-to-jailbreak-and-worse","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/","title":{"rendered":"Deepseek&#8217;s AI model proves easy to jailbreak &#8211; and worse"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/46137777f2cd153afc29659fe27a8160c9c5c49b\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=768\" alt=\"gettyimages-1252442731\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f62b54e55cba53e15d7ceecdb8cdc30ba5ffb915\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1024\" alt=\"gettyimages-1252442731\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\" alt=\"gettyimages-1252442731\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\" alt=\"gettyimages-1252442731\" width=\"1280\" height=\"854.1387446908919\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">goc\/Getty Images<\/span><\/figcaption><\/figure>\n<p>Amidst equal parts elation and controversy over what its performance means for AI, Chinese startup <a href=\"https:\/\/www.zdnet.com\/article\/public-deepseek-ai-database-exposes-api-keys-and-other-user-data\/\">DeepSeek<\/a> continues to raise security concerns.&nbsp;<\/p>\n<p>On Thursday, Unit 42, a cybersecurity research team at Palo Alto Networks, <a href=\"https:\/\/unit42.paloaltonetworks.com\/jailbreaking-deepseek-three-techniques\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">published results<\/a> on three jailbreaking methods it employed against several distilled versions of DeepSeek&#8217;s V3 and R1 models. According to the report, these efforts &#8220;achieved significant bypass rates, with little to no specialized knowledge or expertise being necessary.&#8221;&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/public-deepseek-ai-database-exposes-api-keys-and-other-user-data\/\">Public DeepSeek AI database exposes API keys and other user data<\/a><\/strong><\/p>\n<p>&#8220;Our research findings show that these jailbreak methods can elicit explicit guidance for malicious activities,&#8221; the report states. &#8220;These activities include keylogger creation, data exfiltration, and even instructions for incendiary devices, demonstrating the tangible security risks posed by this emerging class of attack.&#8221;<\/p>\n<p>Researchers were able to prompt DeepSeek for guidance on how to steal and transfer sensitive data, bypass security, write &#8220;highly convincing&#8221; spear-phishing emails, conduct &#8220;sophisticated&#8221; social engineering attacks, and make a Molotov cocktail. They were also able to manipulate the models into creating malware.&nbsp;<\/p>\n<p><!----><\/p>\n<p>&#8220;While information on creating Molotov cocktails and keyloggers is readily available online, LLMs with insufficient safety restrictions could lower the barrier to entry for malicious actors by compiling and presenting easily usable and actionable output,&#8221; the paper adds.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/openai-launches-new-o3-mini-model-heres-how-free-chatgpt-users-can-try-it\/\">OpenAI launches new o3-mini model &#8211; here&#8217;s how free ChatGPT users can try it<\/a><\/strong><\/p>\n<p>On Friday, Cisco also released a <a href=\"https:\/\/blogs.cisco.com\/security\/evaluating-security-risk-in-deepseek-and-other-frontier-reasoning-models\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">jailbreaking report<\/a>&nbsp;for DeepSeek R1. After targeting R1 with 50 HarmBench prompts, researchers found DeepSeek had &#8220;a 100% attack success rate, meaning it failed to block a single harmful prompt.&#8221; You can see how DeepSeek compares to other top models&#8217; resistance rates below.&nbsp;<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/\" alt=\"model-safety-bar-chart\" width=\"1280\" height=\"763.2137443153108\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Cisco<\/span><\/figcaption><\/figure>\n<p>&#8220;We must understand if DeepSeek and its new paradigm of reasoning has any significant tradeoffs when it comes to safety and security,&#8221; the report notes.&nbsp;<\/p>\n<p>Also on Friday, security provider Wallarm <a href=\"https:\/\/lab.wallarm.com\/jailbreaking-generative-ai\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">released<\/a> its own jailbreaking report, stating it had gone a step beyond attempting to get DeepSeek to generate harmful content. After testing V3 and R1, the report claims to have revealed DeepSeek&#8217;s system prompt, or the underlying instructions that define how a model behaves, as well as its limitations.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/copilots-powerful-new-think-deeper-feature-is-free-for-all-users-how-it-works\/\">Copilot&#8217;s powerful new &#8216;Think Deeper&#8217; feature is free for all users &#8211; how it works<\/a><\/strong><\/p>\n<p>The findings reveal &#8220;potential vulnerabilities in the model&#8217;s security framework,&#8221; Wallarm says.&nbsp;<\/p>\n<p>OpenAI has <a href=\"https:\/\/www.ft.com\/content\/a0dfedd1-5255-4fa9-8ccc-1fe01de87ea6\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">accused<\/a> DeepSeek of using its models, which are proprietary, to train V3 and R1, thus violating its terms of service. In its report, Wallarm claims to have prompted DeepSeek to reference OpenAI &#8220;in its disclosed training lineage,&#8221; which &#8212; the firm says &#8212; indicates &#8220;OpenAI&#8217;s technology may have played a role in shaping DeepSeek&#8217;s knowledge base.&#8221;<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/\" alt=\"deepseek-img-2\" width=\"1280\" height=\"1189.1990846681922\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6.5\">\n<div class=\"c-ShortcodeContent\" readability=\"33\">\n<p>Wallarm&#8217;s chats with DeepSeek, which mention OpenAI.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Wallarm<\/span><\/figcaption><\/figure>\n<p>&#8220;In the case of DeepSeek, one of the most intriguing post-jailbreak discoveries is the ability to extract details about the models used for training and distillation. Normally, such internal information is shielded, preventing users from understanding the proprietary or external datasets leveraged to optimize performance,&#8221; the report explains.&nbsp;<\/p>\n<p>&#8220;By circumventing standard restrictions, jailbreaks expose how much oversight AI providers maintain over their own systems, revealing not only security vulnerabilities but also potential evidence of cross-model influence in AI training pipelines,&#8221; it continues.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/apple-researchers-reveal-the-secret-sauce-behind-deepseek-ai\/\">Apple researchers reveal the secret sauce behind DeepSeek AI<\/a><\/strong><\/p>\n<p>The prompt Wallarm used to get that response is redacted in the report, &#8220;in order not to potentially compromise other vulnerable models,&#8221; researchers told ZDNET via email. The company emphasized that this jailbrokem response is not a confirmation of OpenAI&#8217;s suspicion that DeepSeek distilled its models.&nbsp;<\/p>\n<p>As <a href=\"https:\/\/www.404media.co\/email\/855bf870-82ce-4544-8776-2225627fa39d\/?\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">404 Media<\/a> and others have pointed out, OpenAI&#8217;s concern is somewhat ironic, given the discourse around its own public data theft.&nbsp;<\/p>\n<p>Wallarm says it informed DeepSeek of the vulnerability, and that the company has already patched the issue. But just days after a <a href=\"https:\/\/www.zdnet.com\/article\/public-deepseek-ai-database-exposes-api-keys-and-other-user-data\/\">DeepSeek database was found unguarded<\/a> and available on the internet (and was then swiftly taken down, upon notice), the findings signal potentially significant safety holes in the models that DeepSeek did not red-team out before release. That said, researchers have <a href=\"https:\/\/www.zdnet.com\/article\/how-many-shot-jailbreaking-can-be-used-to-fool-ai\/\">frequently been able to jailbreak<\/a> popular US-created models from more established AI giants, including ChatGPT.<\/p>\n<div id=\"pinbox-dcbc2e20-2fd2-4911-98e7-619397d07df7\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Artificial Intelligence<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In one security firm&#8217;s test, the chatbot alluded to using OpenAI&#8217;s training data.READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-58089","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deepseek&#039;s AI model proves easy to jailbreak - and worse 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepseek&#039;s AI model proves easy to jailbreak - and worse 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-31T19:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Deepseek&#8217;s AI model proves easy to jailbreak &#8211; and worse\",\"datePublished\":\"2025-01-31T19:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\\\/2025\\\/01\\\/31\\\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\\\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/\",\"name\":\"Deepseek's AI model proves easy to jailbreak - and worse 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\\\/2025\\\/01\\\/31\\\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\\\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2025-01-31T19:43:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\\\/2025\\\/01\\\/31\\\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\\\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\\\/2025\\\/01\\\/31\\\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\\\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deepseek&#8217;s AI model proves easy to jailbreak &#8211; and worse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepseek's AI model proves easy to jailbreak - and worse 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/","og_locale":"en_US","og_type":"article","og_title":"Deepseek's AI model proves easy to jailbreak - and worse 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-01-31T19:43:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Deepseek&#8217;s AI model proves easy to jailbreak &#8211; and worse","datePublished":"2025-01-31T19:43:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/"},"wordCount":725,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/","url":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/","name":"Deepseek's AI model proves easy to jailbreak - and worse 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280","datePublished":"2025-01-31T19:43:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b02a2fd6eaa7ab84faac723f697c3c653234ec9\/2025\/01\/31\/c4a8aa5f-32aa-4a55-bb6f-8d2a71b7f514\/gettyimages-1252442731.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/deepseeks-ai-model-proves-easy-to-jailbreak-and-worse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Deepseek&#8217;s AI model proves easy to jailbreak &#8211; and worse"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58089"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58089\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}