Information security
fromBleepingComputer
6 days agoThreat actors abuse X's Grok AI to spread malicious links
Attackers exploit Grok to extract hidden malicious links from X post metadata, using AI responses to amplify scams and bypass platform link filters.