Researchers Show Copilot and Grok Can Be Abused as Malware C2 ProxiesCybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection. https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html#copilot #crok #ai #malware #itsecurity #cybersecurity #attack #xai #ms #c2 #microsoft