Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of Iran cyber attacks. Close-up of a person wearing glasses, with computer code reflected in the lenses.
 category iconHigh Profile Threats March 26, 2026

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26)

Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders.

  • APK
  • DDoS attacks
  • GenAI
Read now
Pictorial representation of cyberespionage campaigns. Digital world map with abstract lines and circles in various colors overlaying it, suggesting data flow and connections. The map appears in shades of blue against a darker background.
 category iconThreat Actor Groups March 26, 2026

Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

  • CL-STA-1048
  • CL-STA-1049
  • Stately Taurus
Read now
Pictorial representation of phishing campaign. A blurred image focusing on a person typing on a laptop with lines of code visible on the screen, illuminated in blue and red lights, suggestive of intense coding or cyber activities.
 category iconThreat Research March 24, 2026

Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team

  • Email scam
  • Lure
  • Phishing
Read now
Pictorial representation of passwordless authentication. Futuristic cityscape with skyscrapers surrounded by glowing, neon-lit pathways and digital clouds. The sky is vibrant with pink and orange hues, giving a surreal, cyberpunk aesthetic.
 category iconThreat Research March 23, 2026

Google Authenticator: The Hidden Mechanisms of Passwordless Authentication

  • Google
  • Google authenticator
  • Google Chrome
Read now
Pictorial representation of a command center featuring glowing wireframe figures standing on a reflective circular pattern.
 category iconInsights March 20, 2026

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

  • Agentic AI
  • E-commerce
  • Retail
Read now
Pictorial representation of AI use in malware. Digital artwork depicting a malware alert symbol on a computer screen, with background of blurred programming code in blue and red colors.
 category iconThreat Research March 19, 2026

Analyzing the Current State of AI Use in Malware

  • .NET
  • ChatGPT
  • GenAI
Read now
Pictorial representation of a group of individuals conversing in an office setting.
 category iconInsights March 18, 2026

Navigating Security Tradeoffs of AI Agents

  • Agentic AI
  • Privilege escalation
  • Unit 42 Incident Response Report
Read now
Pictorial representation of algorithm-inspired prompt fuzzing. A close-up of a circuit board with glowing, colorful microchips emitting blue and orange light.
 category iconThreat Research March 17, 2026

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

  • Evasion
  • GenAI
  • LLM
Read now
Pictorial representation of the APT Boggy Serpens. An illustrated blue snake is highlighted by a red circle against a night sky. The constellation serpens.
 category iconThreat Research March 16, 2026

Boggy Serpens Threat Assessment

  • Advanced Persistent Threat
  • Boggy Serpens
  • C2
Read now
Pictorial representation of Iran cyber attack history. A digitally rendered cityscape resembling a circuit board, with glowing lines and skyscraper-like structures representing electronic components. The background features a blurred city skyline, illuminated by a warm light.
 category iconInsights March 16, 2026

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

  • Agonizing Serpens
  • Agrius
  • Curious Serpens
Read now
Pictorial representation of Iran wiper attacks. A vibrant digital landscape featuring a glowing network of blue circuit lines and nodes extending outward from a central illuminated point on a dark background, reminiscent of a futuristic or cybernetic interface.
 category iconInsights March 12, 2026

Insights: Increased Risk of Wiper Attacks

  • Hacktivism
  • Wiper
Read now
A pictorial representation of CL-STA-1087 state-sponsored espionage. An illustration of a glowing red warning icon centered on a detailed blue circuit board background, representing the detection of this persistent campaign targeting Southeast Asian military organizations.
 category iconThreat Research March 12, 2026

Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia

  • Advanced Persistent Threat
  • AppleChris
  • Backdoor
Read now
Pictorial representation of the critical security vulnerabilities in AI judges. A digital image of a skull formed by blue binary code on a black background, with scattered ones and zeros and digital noise, symbolizes how stealthy prompt injection attacks can exploit AI logic to bypass security controls.
 category iconThreat Research March 10, 2026

Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls

  • AI
  • Fuzzing
  • LLM
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2026 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow