Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of the supply chain attack compromising Axios. A giant eye made of glowing binary code.
 category iconHigh Profile Threats April 1, 2026

Threat Brief: Widespread Impact of the Axios Supply Chain Attack

Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup.

  • API attacks
  • JavaScript
  • Supply chain
Read now
Pictorial representation of TeamPCP. Glowing code on a screen where several word such as Crime, Hackers, and Security are highlighted in a contrasting color.
 category iconHigh Profile Threats March 31, 2026

Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure

  • CVE-2025-55182
  • GitHub
  • Infostealer
Read now
Pictorial representation of Vertex AI. A person is working on a laptop and a tablet. The screen displays digital graphics, including a prominent "AI" symbol.
 category iconThreat Research March 31, 2026

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

  • Agentic AI
  • Data exfiltration
  • GCP
Read now
Pictorial representation of Iran cyber attacks. Close-up of a person wearing glasses, with computer code reflected in the lenses.
 category iconHigh Profile Threats March 26, 2026

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26)

  • APK
  • DDoS attacks
  • GenAI
Read now
Pictorial representation of cyberespionage campaigns. Digital world map with abstract lines and circles in various colors overlaying it, suggesting data flow and connections. The map appears in shades of blue against a darker background.
 category iconThreat Actor Groups March 26, 2026

Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

  • CL-STA-1048
  • CL-STA-1049
  • Stately Taurus
Read now
Pictorial representation of phishing campaign. A blurred image focusing on a person typing on a laptop with lines of code visible on the screen, illuminated in blue and red lights, suggestive of intense coding or cyber activities.
 category iconThreat Research March 24, 2026

Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team

  • Email scam
  • Lure
  • Phishing
Read now
Pictorial representation of passwordless authentication. Futuristic cityscape with skyscrapers surrounded by glowing, neon-lit pathways and digital clouds. The sky is vibrant with pink and orange hues, giving a surreal, cyberpunk aesthetic.
 category iconThreat Research March 23, 2026

Google Cloud Authenticator: The Hidden Mechanisms of Passwordless Authentication

  • Google
  • Google authenticator
  • Google Chrome
Read now
Pictorial representation of a command center featuring glowing wireframe figures standing on a reflective circular pattern.
 category iconInsights March 20, 2026

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

  • Agentic AI
  • E-commerce
  • Retail
Read now
Pictorial representation of AI use in malware. Digital artwork depicting a malware alert symbol on a computer screen, with background of blurred programming code in blue and red colors.
 category iconThreat Research March 19, 2026

Analyzing the Current State of AI Use in Malware

  • .NET
  • ChatGPT
  • GenAI
Read now
Pictorial representation of a group of individuals conversing in an office setting.
 category iconInsights March 18, 2026

Navigating Security Tradeoffs of AI Agents

  • Agentic AI
  • Privilege escalation
  • Unit 42 Incident Response Report
Read now
Pictorial representation of algorithm-inspired prompt fuzzing. A close-up of a circuit board with glowing, colorful microchips emitting blue and orange light.
 category iconThreat Research March 17, 2026

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

  • Evasion
  • GenAI
  • LLM
Read now
Pictorial representation of the APT Boggy Serpens. An illustrated blue snake is highlighted by a red circle against a night sky. The constellation serpens.
 category iconThreat Research March 16, 2026

Boggy Serpens Threat Assessment

  • Advanced Persistent Threat
  • Boggy Serpens
  • C2
Read now
Pictorial representation of Iran cyber attack history. A digitally rendered cityscape resembling a circuit board, with glowing lines and skyscraper-like structures representing electronic components. The background features a blurred city skyline, illuminated by a warm light.
 category iconInsights March 16, 2026

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

  • Agonizing Serpens
  • Agrius
  • Curious Serpens
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2026 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow