First known use of an adaptive malware that incorporates an LLM into the attack methodology
19,11K