Google’s Threat Intelligence Group reports that new malware strains use LLMs mid-execution to generate, rewrite, and ...
Researchers say the malware was in the repository for two weeks, advise precautions to defend against malicious packages.