?? Scientists carried out the first cyberattack without the participation of people
?? Scientists carried out the first cyberattack without the participation of people The malicious code was created using the Text-to-SQL model, which is capable of deceiving NPL models of natural language processing and leading to the theft of confidential information and DoS attacks.