{"id":2013,"date":"2025-02-02T13:39:28","date_gmt":"2025-02-02T11:39:28","guid":{"rendered":"https:\/\/adymedia.ro\/blog\/?p=2013"},"modified":"2025-07-04T17:26:42","modified_gmt":"2025-07-04T15:26:42","slug":"hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5","status":"publish","type":"post","link":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/","title":{"rendered":"Hackerii folosesc AI pentru atacuri cibernetice"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2013\" class=\"elementor elementor-2013\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2760f98 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2760f98\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20f6af5\" data-id=\"20f6af5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7370e8e elementor-widget elementor-widget-text-editor\" data-id=\"7370e8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.4.8 - 16-11-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>\u00centr-o lume digitalizat\u0103, unde inteligen\u021ba artificial\u0103 devine tot mai avansat\u0103, apar \u0219i riscuri noi. Recent, Google a avertizat c\u0103 grupuri de hackeri folosesc AI-ul Gemini pentru a-\u0219i \u00eembun\u0103t\u0103\u021bi atacurile cibernetice. \u00cen acela\u0219i timp, un raport al firmei de securitate cibernetic\u0103 KELA a dezv\u0103luit c\u0103 modelele DeepSeek R1 \u0219i Qwen 2.5 de la Alibaba prezint\u0103 vulnerabilit\u0103\u021bi grave, cercet\u0103torii din Unitatea 42 au demonstrat tehnici de <strong>jailbreaking<\/strong> care permit utilizarea acestor modele \u00een scopuri r\u0103u inten\u021bionate.<\/p><p>Acest articol analizeaz\u0103 modul \u00een care hackerii exploateaz\u0103 aceste tehnologii \u0219i ce m\u0103suri de securitate sunt necesare pentru a preveni atacurile.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4963cdc elementor-widget elementor-widget-global elementor-global-1210 elementor-widget-read-more\" data-id=\"4963cdc\" data-element_type=\"widget\" data-widget_type=\"read-more.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div> <a href=\"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#more-2013\" class=\"more-link elementor-more-link\"><span aria-label=\"Continu\u0103 lectura Hackerii folosesc AI pentru atacuri cibernetice\">Continu\u0103 lectura<\/span><\/a>","protected":false},"excerpt":{"rendered":"<p>Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.<\/p>\n","protected":false},"author":1,"featured_media":2015,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[115,8,85],"tags":[126,86],"class_list":["post-2013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aplicatii","category-itc","category-securitate","tag-ai","tag-securitate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackerii folosesc AI pentru atacuri cibernetice - Blogul lui Ady<\/title>\n<meta name=\"description\" content=\"Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackerii folosesc AI pentru atacuri cibernetice - Blogul lui Ady\" \/>\n<meta property=\"og:description\" content=\"Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogul lui Ady\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AdyMedia.ro\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/AdyMedia.ro\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-02T11:39:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-04T15:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2025\/02\/hackerii-folosesc-ai-pentru-atacuri.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ady\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ady\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/\"},\"author\":{\"name\":\"Ady\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/#\\\/schema\\\/person\\\/e7780c526e651f4d3d43b672cc80651e\"},\"headline\":\"Hackerii folosesc AI pentru atacuri cibernetice\",\"datePublished\":\"2025-02-02T11:39:28+00:00\",\"dateModified\":\"2025-07-04T15:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/\"},\"wordCount\":1097,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/#\\\/schema\\\/person\\\/e7780c526e651f4d3d43b672cc80651e\"},\"image\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/hackerii-folosesc-ai-pentru-atacuri.webp\",\"keywords\":[\"ai\",\"securitate\"],\"articleSection\":[\"Aplicatii\",\"IT&amp;C\",\"Securitate\"],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/\",\"url\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/\",\"name\":\"Hackerii folosesc AI pentru atacuri cibernetice - Blogul lui Ady\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/hackerii-folosesc-ai-pentru-atacuri.webp\",\"datePublished\":\"2025-02-02T11:39:28+00:00\",\"dateModified\":\"2025-07-04T15:26:42+00:00\",\"description\":\"Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/hackerii-folosesc-ai-pentru-atacuri.webp\",\"contentUrl\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/hackerii-folosesc-ai-pentru-atacuri.webp\",\"width\":1344,\"height\":768,\"caption\":\"Hackerii folosesc AI pentru atacuri cibernetice\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackerii folosesc AI pentru atacuri cibernetice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/\",\"name\":\"Blogul lui Ady\",\"description\":\"Blog despre IT si nu doar...\",\"publisher\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/#\\\/schema\\\/person\\\/e7780c526e651f4d3d43b672cc80651e\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/#\\\/schema\\\/person\\\/e7780c526e651f4d3d43b672cc80651e\",\"name\":\"Ady\",\"pronouns\":\"eoliann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/AdyMedia.ro1_.jpg\",\"url\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/AdyMedia.ro1_.jpg\",\"contentUrl\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/AdyMedia.ro1_.jpg\",\"width\":955,\"height\":551,\"caption\":\"Ady\"},\"logo\":{\"@id\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/AdyMedia.ro1_.jpg\"},\"sameAs\":[\"https:\\\/\\\/adymedia.ro\\\/blog\",\"https:\\\/\\\/www.facebook.com\\\/AdyMedia.ro\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC1uNq6sCf2_jAoGKQBCGp8Q\"],\"url\":\"https:\\\/\\\/adymedia.ro\\\/blog\\\/author\\\/eoliann\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackerii folosesc AI pentru atacuri cibernetice - Blogul lui Ady","description":"Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/","og_locale":"ro_RO","og_type":"article","og_title":"Hackerii folosesc AI pentru atacuri cibernetice - Blogul lui Ady","og_description":"Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.","og_url":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/","og_site_name":"Blogul lui Ady","article_publisher":"https:\/\/www.facebook.com\/AdyMedia.ro","article_author":"https:\/\/www.facebook.com\/AdyMedia.ro","article_published_time":"2025-02-02T11:39:28+00:00","article_modified_time":"2025-07-04T15:26:42+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2025\/02\/hackerii-folosesc-ai-pentru-atacuri.webp","type":"image\/jpeg"}],"author":"Ady","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"Ady","Timp estimat pentru citire":"6 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#article","isPartOf":{"@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/"},"author":{"name":"Ady","@id":"https:\/\/adymedia.ro\/blog\/#\/schema\/person\/e7780c526e651f4d3d43b672cc80651e"},"headline":"Hackerii folosesc AI pentru atacuri cibernetice","datePublished":"2025-02-02T11:39:28+00:00","dateModified":"2025-07-04T15:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/"},"wordCount":1097,"commentCount":0,"publisher":{"@id":"https:\/\/adymedia.ro\/blog\/#\/schema\/person\/e7780c526e651f4d3d43b672cc80651e"},"image":{"@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#primaryimage"},"thumbnailUrl":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2025\/02\/hackerii-folosesc-ai-pentru-atacuri.webp","keywords":["ai","securitate"],"articleSection":["Aplicatii","IT&amp;C","Securitate"],"inLanguage":"ro-RO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/","url":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/","name":"Hackerii folosesc AI pentru atacuri cibernetice - Blogul lui Ady","isPartOf":{"@id":"https:\/\/adymedia.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#primaryimage"},"image":{"@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#primaryimage"},"thumbnailUrl":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2025\/02\/hackerii-folosesc-ai-pentru-atacuri.webp","datePublished":"2025-02-02T11:39:28+00:00","dateModified":"2025-07-04T15:26:42+00:00","description":"Imagina\u021bi-v\u0103 un scenariu \u00een care cele mai avansate instrumente de inteligen\u021b\u0103 artificial\u0103, create pentru a ajuta omenirea, devin arme \u00een m\u00e2inile unor atacatori sofistica\u021bi.","breadcrumb":{"@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#primaryimage","url":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2025\/02\/hackerii-folosesc-ai-pentru-atacuri.webp","contentUrl":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2025\/02\/hackerii-folosesc-ai-pentru-atacuri.webp","width":1344,"height":768,"caption":"Hackerii folosesc AI pentru atacuri cibernetice"},{"@type":"BreadcrumbList","@id":"https:\/\/adymedia.ro\/blog\/hackerii-folosesc-ai-pentru-atacuri-cibernetice-vulnerabilitati-in-gemini-ai-deepseek-r1-si-qwen-2-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/adymedia.ro\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackerii folosesc AI pentru atacuri cibernetice"}]},{"@type":"WebSite","@id":"https:\/\/adymedia.ro\/blog\/#website","url":"https:\/\/adymedia.ro\/blog\/","name":"Blogul lui Ady","description":"Blog despre IT si nu doar...","publisher":{"@id":"https:\/\/adymedia.ro\/blog\/#\/schema\/person\/e7780c526e651f4d3d43b672cc80651e"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adymedia.ro\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":["Person","Organization"],"@id":"https:\/\/adymedia.ro\/blog\/#\/schema\/person\/e7780c526e651f4d3d43b672cc80651e","name":"Ady","pronouns":"eoliann","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2023\/05\/AdyMedia.ro1_.jpg","url":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2023\/05\/AdyMedia.ro1_.jpg","contentUrl":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2023\/05\/AdyMedia.ro1_.jpg","width":955,"height":551,"caption":"Ady"},"logo":{"@id":"https:\/\/adymedia.ro\/blog\/wp-content\/uploads\/2023\/05\/AdyMedia.ro1_.jpg"},"sameAs":["https:\/\/adymedia.ro\/blog","https:\/\/www.facebook.com\/AdyMedia.ro","https:\/\/www.youtube.com\/channel\/UC1uNq6sCf2_jAoGKQBCGp8Q"],"url":"https:\/\/adymedia.ro\/blog\/author\/eoliann\/"}]}},"_links":{"self":[{"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/posts\/2013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/comments?post=2013"}],"version-history":[{"count":30,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/posts\/2013\/revisions"}],"predecessor-version":[{"id":2495,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/posts\/2013\/revisions\/2495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/media\/2015"}],"wp:attachment":[{"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/media?parent=2013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/categories?post=2013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adymedia.ro\/blog\/wp-json\/wp\/v2\/tags?post=2013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}