April 2, 2024, 9:25 a.m. | solomon.klappholz@futurenet.com (Solomon Klappholz)

ITPro www.itpro.com

New research reveals a novel attack path where threat actors could leverage nonexistent open-source packages hallucinated by models to inject malware into enterprise repositories

ai hallucinations attack attack path enterprise hackers hallucinations inject malicious malicious software malware novel packages path repositories research security software threat threat actors

Senior Security Researcher

@ Microsoft | Redmond, Washington, United States

Sr. Cyber Risk Analyst

@ American Heart Association | Dallas, TX, United States

Cybersecurity Engineer 2/3

@ Scaled Composites, LLC | Mojave, CA, US

Information Security Operations Manager

@ DP World | Charlotte, NC, United States

Sr Cyber Security Engineer I

@ Staples | Framingham, MA, United States

Security Engineer - Heartland (Remote)

@ GuidePoint Security LLC | Remote in the US