Tag DeepSeek

Preventing Data Leaks Before They Strike

In January 2025, cybersecurity experts from Wiz Research uncovered a significant data leak at Chinese AI firm DeepSeek, which compromised over 1 million sensitive log streams. The researchers discovered a publicly accessible ClickHouse database associated with DeepSeek, granting potential full control over database operations and allowing access to internal data. This incident included more than a million lines of log streams containing chat histories, secret keys, and more. Wiz promptly notified DeepSeek, which took immediate action to secure the vulnerability. However, this event highlights the persistent risk of data leakage. Whether intentional or accidental, data leakage encompasses various scenarios, as defined by IBM, which describes it as the unintentional exposure of sensitive information to unauthorized parties. On the intentional side…

Identifying Data Leaks Before They Escalate In early January 2025, cybersecurity firm Wiz Research unveiled that DeepSeek, a Chinese AI company, faced a serious data leak exposing over one million sensitive log entries. The Wiz team discovered a publicly accessible ClickHouse database owned by DeepSeek, which compromised the organization’s operations…

Read More

Preventing Data Leaks Before They Strike

In January 2025, cybersecurity experts from Wiz Research uncovered a significant data leak at Chinese AI firm DeepSeek, which compromised over 1 million sensitive log streams. The researchers discovered a publicly accessible ClickHouse database associated with DeepSeek, granting potential full control over database operations and allowing access to internal data. This incident included more than a million lines of log streams containing chat histories, secret keys, and more. Wiz promptly notified DeepSeek, which took immediate action to secure the vulnerability. However, this event highlights the persistent risk of data leakage. Whether intentional or accidental, data leakage encompasses various scenarios, as defined by IBM, which describes it as the unintentional exposure of sensitive information to unauthorized parties. On the intentional side…

⚡ Weekly Roundup: Firewall Vulnerabilities, AI Data Breaches, Android Hacks, APT Incidents, Insider Leaks, and Beyond

The past week underscored a critical evolution in cyber threats, illustrating that attackers no longer require large-scale hacks to unleash significant damage. Instead, they are targeting essential tools that organizations rely on, including firewalls, browser extensions, and even smart devices. These seemingly minor vulnerabilities can become gateways to severe breaches.…

Read More⚡ Weekly Roundup: Firewall Vulnerabilities, AI Data Breaches, Android Hacks, APT Incidents, Insider Leaks, and Beyond

Anthropic Alleges Model Mining by Chinese AI Companies

Agentic AI, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Agentic AI Firms Accused of Conducting Large-Scale Data Theft Using Fake Accounts Rashmi Ramesh (rashmiramesh_) • February 24, 2026 Allegations point to extensive operations by China-based MiniMax that conducted more than 13 million data exchanges targeting agentic capabilities.…

Read MoreAnthropic Alleges Model Mining by Chinese AI Companies

AI-Powered Hacking Campaign Compromises Over 600 Fortinet Devices

Cybersecurity Update: AI-Powered Attack on Fortinet Firewalls and Other Breaches In a recent development in the cybersecurity landscape, a financially motivated threat actor, reportedly Russian-speaking, has leveraged commercial AI toolkits to compromise over 600 Fortinet firewalls. This operation was first identified by the AWS security team, indicating that the activity…

Read MoreAI-Powered Hacking Campaign Compromises Over 600 Fortinet Devices

AI-Enhanced Hacker Compromises 600 Fortinet Firewalls in Just 5 Weeks

This article has been updated to include additional technical insights into the hacking campaign. Amazon’s latest security advisory indicates that a Russian-speaking hacker orchestrated a sophisticated cyber campaign utilizing generative AI services, successfully breaching over 600 FortiGate firewalls across 55 nations within a short span of five weeks. This alarming…

Read MoreAI-Enhanced Hacker Compromises 600 Fortinet Firewalls in Just 5 Weeks

Using AI to Create Ransomware for Profit? Think Twice Before You Take the Risk

Transcript This transcript has been streamlined for clarity. Mathew Schwartz: Hello. I’m Mathew Schwartz from Information Security Media Group, and today I’m joined by Candid Wüest, a prominent security advocate at Xorlab. Candid, it’s a pleasure to have you here. Candid Wüest: Thank you for having me. Mathew Schwartz: You…

Read MoreUsing AI to Create Ransomware for Profit? Think Twice Before You Take the Risk

Hackers Target AI Systems with Over 91,000 Attacks Using Fake Ollama Servers

Recent research has unveiled a significant shift in cybercriminal activity, with intruders now targeting the underlying systems that drive contemporary artificial intelligence (AI). Between October 2025 and January 2026, a strategically deployed honeypot—a decoy setup used by cybersecurity experts to attract hackers—documented an astonishing 91,403 attack attempts. This study, carried…

Read MoreHackers Target AI Systems with Over 91,000 Attacks Using Fake Ollama Servers