A now corrected issue let researchers circumvent Apple’s restrictions and force the on-device LLM to execute attacker-controlled actions.
Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and ...