Check Point Research’s demonstration that web-accessible AI assistants can be turned into covert command-and-control relays is a practical wake-up call: by using browsing and URL-fetch features exposed in services such as Grok and Microsoft Copilot, attackers can hide C2 traffic inside otherwise...