Diamond Member ThaHaka 0 Posted February 17 Diamond Member Share Posted February 17 This is the hidden content, please Sign In or Sign Up Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection. The attack method, which has been demonstrated against This is the hidden content, please Sign In or Sign Up Copilot and xAI Grok This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/301129-h4ckn3wsresearchers-show-copilot-and-grok-can-be-abused-as-malware-c2-proxies/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.