<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Inside DeepSeek’s Security Flaws in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-inside-deepseek-s-security-flaws/ta-p/1225376</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Threat Vector Template_palo-alto-networks (2).jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66886i6818E7739FC63AC1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Threat Vector Template_palo-alto-networks (2).jpg" alt="Title_Threat Vector Template_palo-alto-networks (2).jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Artificial intelligence is advancing fast, but with innovation comes risk. In this episode of &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;/FONT&gt;, host David Moulton sits down with Sam Rubin, &lt;EM&gt;SVP of Consulting and Threat Intelligence&lt;/EM&gt; at Unit 42, and Kyle Wilhoit, &lt;EM&gt;Director of Threat Researc&lt;/EM&gt;h, to explore the vulnerabilities of DeepSeek, a new large language model.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;They dive into AI jailbreaking techniques like Bad Likert Judge and Deceptive Delight, uncovering how attackers can manipulate models to generate harmful content. The discussion highlights security risks, data integrity concerns, and why businesses must carefully evaluate AI tools before adopting them. Tune in for expert insights on the evolving cybersecurity landscape and what organizations can do to stay protected!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Protect yourself from the evolving threat landscape - more episodes of Threat Vector are a click away!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW9931078742" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 02 Apr 2025 00:28:58 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-04-02T00:28:58Z</dc:date>
    <item>
      <title>Threat Vector | Inside DeepSeek’s Security Flaws</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-inside-deepseek-s-security-flaws/ta-p/1225376</link>
      <description>&lt;P&gt;Artificial intelligence is advancing fast, but with innovation comes risk. In this episode of &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;/FONT&gt;, host David Moulton sits down with Sam Rubin, &lt;EM&gt;SVP of Consulting and Threat Intelligence&lt;/EM&gt; at Unit 42, and Kyle Wilhoit, &lt;EM&gt;Director of Threat Researc&lt;/EM&gt;h, to explore the vulnerabilities of DeepSeek, a new large language model.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Threat Vector Template_palo-alto-networks (2).jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66889i88B7924B256F41B7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Threat Vector Template_palo-alto-networks (2).jpg" alt="Title_Threat Vector Template_palo-alto-networks (2).jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 00:28:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-inside-deepseek-s-security-flaws/ta-p/1225376</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-04-02T00:28:58Z</dc:date>
    </item>
  </channel>
</rss>

