Daily Threat Intel by CyberDudeBivash Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks. Follow on LinkedIn Apps & Security Tools DeepSeek-R1 Generates Code with Severe Security Flaws: A Full Cybersecurity & Exploitability Breakdown Author: CyberDudeBivash Brand: CyberDudeBivash Pvt Ltd Web: cyberdudebivash.com | cyberbivash.blogspot.com | cyberdudebivash-news.blogspot.com | cryptobivash.code.blog SUMMARY DeepSeek-R1 is producing insecure code patterns even when asked for “secure code”. Findings include SQL injections, RCE primitives, open redirect flaws, hardcoded secrets, unsafe eval() and insecure crypto usage. Attackers can exploit these AI-generated patterns to build malware, backdoors, or vulnerable apps. This post includes real examples, exploit chains, security impact, IOCs, and secure coding fixes. CyberDudeBivash provides enterprise-grade AI security audi...
ChatGPT Targeted: “ShadowLeak” Zero-Click Vulnerability in Deep Research Could Exfiltrate Gmail Data A Complete Cyber Threat Analysis Report — By CyberDudeBivash Author: CyberDudeBivash · Powered by: CyberDudeBivash
Executive summary Researchers at Radware disclosed ShadowLeak , a zero-click indirect prompt-injection flaw in ChatGPT’s Deep Research agent that, when connected to Gmail (and browsing enabled), could exfiltrate inbox data via a single crafted email —with no user interaction and no visible UI cues . OpenAI confirmed and patched the issue before public disclosure (September 18–20, 2025). The attack is notable for being service-side : data leaves OpenAI’s cloud rather than the user’s device, making enterprise detection far harder. SecurityWeek +3 radware.com +3 radware.com +3 What is Deep Research and why it was exposed Deep Research lets users delegate multi-step tasks to an agentic AI that can browse and access connected data sources (e.g., Gmail, Google Drive) to compile findings. The agent will read emails/attachments as part of its task plan. This connective power, combined with prompt-following , makes it high-impact if an attacker can plant hidden instructions t...