April 2, 2024, 9:25 a.m. | solomon.klappholz@futurenet.com (Solomon Klappholz)

ITPro www.itpro.com

New research reveals a novel attack path where threat actors could leverage nonexistent open-source packages hallucinated by models to inject malware into enterprise repositories

ai hallucinations attack attack path enterprise hackers hallucinations inject malicious malicious software malware novel packages path repositories research security software threat threat actors

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC