Malware can blend in with legitimate AI traffic, using popular AI tools as C2 infrastructure.
AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate ...