Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of indirect prompt injection attacks. A female person intently looking at a computer screen with financial data and graphs overlaid. The setting suggests a tech or financial environment.
 category iconThreat Research March 3, 2026

Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

Uncover real-world indirect prompt injection attacks and learn how adversaries weaponize hidden web content to exploit LLMs for high-impact fraud.

  • Agentic AI
  • GenAI
  • Indirect Prompt Injection
Read now
Pictorial representation of Iran cyber attacks. Close-up of a person wearing glasses, with computer code reflected in the lenses.
 category iconHigh Profile Threats March 2, 2026

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

  • APK
  • DDoS attacks
  • GenAI
Read now
Digital representation of agentic browsers. A dynamic wave pattern composed of blue and red particles on a dark background, symbolizing data flow or connectivity.
 category iconThreat Research March 2, 2026

Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

  • CVE-2026-0628
  • GenAI
  • Google Chrome
Read now
Pictorial representation of multiple screens of code illuminated by blue and orange bokeh lights.
 category iconInsights February 24, 2026

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

  • Defense
  • Operational Technology
  • Threat detection
Read now
Pictorial representation of BeyondTrust vulnerability CVE-2026-1731. Digital art depicting a stylized mountain range with vibrant blue and red hues. The peaks are accentuated by glowing particles and an abstract, starry backdrop, creating a futuristic landscape.
 category iconHigh Profile Threats February 19, 2026

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

  • Bash
  • CVE-2026-1731
  • PowerShell
Read now
 category iconHigh Profile Threats February 17, 2026

Critical Vulnerabilities in Ivanti EPMM Exploited

  • CVE-2026-1281
  • CVE-2026-1340
  • Ivanti
Read now
Pictorial repressentation of QR code attacks. A smartphone displays a glowing red warning symbol resembling an envelope. The background features an out-of-focus high-tech circuit board with various blue and red lights.
 category iconThreat Research February 13, 2026

Phishing on the Edge of the Web and Mobile Using QR Codes

  • Phishing
  • QR Codes
  • Social engineering
Read now
Pictorial representation of Notepad++ supply chain compromise. A digital rendering of Earth from space, focusing on North and South America. The continents are illuminated in blue, with red lines and dots indicating data connections across various locations. Dark background highlights the vibrant network representation.
 category iconHigh Profile Threats February 11, 2026

Nation-State Actors Exploit Notepad++ Supply Chain

  • DLL Sideloading
  • Cobalt Strike
  • Backdoor
Read now
Pictorial representation of Muddled Libra, aka Scattered Spider. A vibrant illustration of the Libra zodiac sign, featuring a stylized balance scale overlaid with a prominent Libra symbol. The background is a starry night sky with shades of purple and blue, suggesting a cosmic theme.
 category iconThreat Actor Groups February 10, 2026

A Peek Into Muddled Libra’s Operational Playbook

  • Muddled Libra
  • PowerShell
  • Scattered Spider
Read now
Close-up of a black woman with glasses examining colorful computer code on a screen. The scene is illuminated by various lights, creating a focused and analytical atmosphere.
 category iconThreat Research February 6, 2026

Novel Technique to Detect Cloud Threat Actor Operations

  • API
  • IAM
  • MITRE
Read now
Pictorial representation of the shadow campaigns. Digital graphic showing a networked globe with various data points and connectivity lines, symbolizing global digital communication and information technology.
 category iconThreat Actor Groups February 5, 2026

The Shadow Campaigns: Uncovering Global Espionage

  • Asia
  • Espionage
  • Government
Read now
Pictorial representation of a group of individuals discussing an idea with a whiteboard.
 category iconInsights February 3, 2026

Why Smart People Fall For Phishing Attacks

  • AI
  • Phishing
Read now
Pictorial representation of CVE-2025-0921. Digital illustration of a map of North America with interconnected glowing lines and dots symbolizing network connections across the continent.
 category iconThreat Research January 30, 2026

Privileged File System Vulnerability Present in a SCADA System

  • CVE-2025-0921
  • Privilege escalation
  • SCADA
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2026 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow