RESEARCHERS WARN COPILOT AND GROK MAY BE USED AS STEALTHY MALWARE C2 PROXIES
Cybersecurity researchers have disclosed a new attack technique showing how artificial intelligence (AI) assistants with web browsing or URL-fetching capabilities can be abused as covert command-and-control (C2) relays. The method could allow attackers to hide malicious communications within legitimate enterprise traffic, making detection significantly more difficult. The technique, called “AI as a C2 proxy,” demonstrates […]
RESEARCHERS WARN COPILOT AND GROK MAY BE USED AS STEALTHY MALWARE C2 PROXIES Read More »










