Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft ...
Researchers say the technique can manipulate how vision-language models interpret both images and user prompts.