π§βπ» Scientists carried out the first cyberattack without the participation of people
The malicious code was created using the Text-to-SQL model, which is capable of deceiving NPL models of natural language processing and leading to the theft of confidential information and DoS attacks.