First known use of an adaptive malware that incorporates an LLM into the attack methodology
16,1K