LHS IT and Cybersecurity Classes
An attacker could combine the individual’s social media username, profile information, and clues from the LLM-generated image to figure out the person’s email address using search engine queries or open-source intelligence, he explained.