Hackers are using LLMs to build the next generation of phishing attacks - here's what to look out for

What if a phishing page was generated on the spot, with no visible malicious code or payload?