News

Unit 42
unit42.paloaltonetworks.com > ai-agent-prompt-injection

Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

1+ hour, 51+ min ago  (1674+ words) Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Highlights…...

Unit 42
unit42.paloaltonetworks.com > iranian-cyberattacks-2026

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

11+ hour, 42+ min ago  (854+ words) Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Highlights…...

Unit 42
unit42.paloaltonetworks.com > gemini-live-in-chrome-hijacking

Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

1+ day, 1+ hour ago  (1087+ words) Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Highlights…...

Unit 42
unit42.paloaltonetworks.com > ot-edge-security

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

6+ day, 22+ hour ago  (927+ words) Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Highlights…...

Unit 42
unit42.paloaltonetworks.com > threat-bulletin > february-2026

Unit 42 Threat Bulletin - February 2026

2+ week, 6+ day ago  (1181+ words) Unit 42's Threat Bulletin is back for the February edition. Discover fresh information and expert perspectives on the latest threats in this fascinating issue. Every month, Unit 42 tracks how attacker behavior is evolving and where defensive assumptions are starting to…...

Unit 42
unit42.paloaltonetworks.com > tracking-threat-groups-through-cloud-logging

Novel Technique to Detect Cloud Threat Actor Operations

3+ week, 3+ day ago  (1705+ words) To prove this method of alert analysis, Unit 42 researchers focused on two known threat actor groups that use two fundamentally different types of operational techniques to compromise their victims" cloud environments. These groups are the cybercrime group Muddled Libra and…...

Unit 42
unit42.paloaltonetworks.com > psychology-of-phishing

Why Smart People Fall For Phishing Attacks

3+ week, 6+ day ago  (384+ words) The cybersecurity landscape of 2026 is stronger than ever with countless security resources and protective tools. Despite robust defenses at anyone's fingertips, common phishing scams and spoofing attacks remain an ongoing issue. Unfortunately, the reality is that these attacks aren't disappearing;…...

Unit 42
unit42.paloaltonetworks.com > iconics-suite-cve-2025-0921

Privileged File System Vulnerability Present in a SCADA System

1+ mon, 3+ day ago  (1138+ words) This report details a vulnerability we found in the Iconics Suite, tracked as CVE-2025-0921 with a Medium CVSS score of 6.5. Iconics Suite is the name of a supervisory control and data acquisition (SCADA) system. This system is used for controlling…...

Unit 42
unit42.paloaltonetworks.com > real-time-malicious-javascript-through-llms

The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time

1+ mon, 1+ week ago  (1118+ words) Imagine visiting a webpage that looks perfectly safe. It has no malicious code, no suspicious links. Yet, within seconds, it transforms into a personalized phishing page. This isn't merely an illusion. It's the next frontier of web attacks where attackers…...

Unit 42
unit42.paloaltonetworks.com > social-engineering-payroll-pirates

Anatomy of an Attack: The Payroll Pirates and the Power of Social Engineering

1+ mon, 2+ week ago  (453+ words) No employee wants their paycheck to go missing. One organization learned about an incident when they started hearing exactly this complaint. It turned out that an attacker had modified direct-deposit details in order to redirect an organization's paychecks into attacker-controlled…...