In many environments, traffic to major AI destinations is already treated as routine, which can let command and control fade into normal web use. The same path can also be used to move data out. Microsoft addressed the work in a statement and framed it as a post compromise communications issue. It said that once a device is compromised, attackers will try to use whatever services are available, including AI based ones, and it urged defense in depth controls to prevent infection and reduce what...