Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of high-risk GenAI and agentic browser extensions. A person interacts with a digital screen displaying an AI symbol, circuit patterns, and various technology icons.
 category iconThreat Research April 30, 2026

That AI Extension Helping You Write Emails? It’s Reading Them First

Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser.

  • AI browser
  • Browser extension
  • GenAI
Read now
Pictorial representation of the npm packages supply chain attack. Screen displaying code with a prominent alert symbol and the words 'VIRUS DETECTED' highlighted in red.
 category iconHigh Profile Threats April 24, 2026

The npm Threat Landscape: Attack Surface and Mitigations

  • Credential Harvesting
  • GitHub
  • Npm packages
Read now
Pictorial representation of a holographic blue globe surrounded by glowing red and blue lights.
 category iconInsights April 24, 2026

TGR-STA-1030: New Activity in Central and South America

  • TGR-STA-1030
Read now
Two individuals are standing on a curved balcony inside a modern building, looking at a laptop displaying charts. The interior design features multiple layers with wooden railings and a central spiral staircase.
 category iconInsights April 23, 2026

Frontier AI and the Future of Defense: Your Top Questions Answered

  • GenAI
  • LLM
  • N-day
Read now
Pictorial representation of autonomous AI attack in cloud environments. Digital illustration of a glowing blue brain connected to a network of lines and lights.
 category iconThreat Research April 23, 2026

Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System

  • AI
  • Cloud
  • Data exfiltration
Read now
Pictorial representation of AirSnitch attacks on enterprise wireless infrastructure. A globe with the continents illuminated in blue lighting and scattered red lights.
 category iconThreat Research April 22, 2026

When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks

  • AirSnitch
  • MitM
  • Network security
Read now
Pictorial representation of security risks in AI models. A group of people is seated at computer workstations in a dimly lit room, facing a large screen displaying a world map with data visualizations.
 category iconInsights April 20, 2026

Fracturing Software Security With Frontier AI Models

  • AI
  • Attack path
  • Data exfiltration
Read now
Pictorial representation of Iran cyber attacks. Close-up of a person wearing glasses, with computer code reflected in the lenses.
 category iconHigh Profile Threats April 17, 2026

Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)

  • APK
  • DDoS attacks
  • GenAI
Read now
Pictorial representation of CVE-2023-33538. Abstract image of a glowing red Wi-Fi symbol on a circuit board, with intricate patterns and a futuristic appearance.
 category iconThreat Research April 16, 2026

A Deep Dive Into Attempted Exploitation of CVE-2023-33538

  • Botnet
  • Command injection
  • CVE-2023-33538
Read now
Pictorial representation of "Agent God Mode" in Amazon Bedrock AgentCore. A futuristic digital landscape depicting cloud technology with glowing orange and blue circuits. Several cloud icons are connected by circuits, symbolizing a network.
 category iconThreat Research April 8, 2026

Cracks in the Bedrock: Agent God Mode

  • Agentcore
  • AI agents
  • AWS
Read now
Pictorial representation of the AWS AgentCore Sandbox. Digital illustration of a 3D cloud made up of glowing lights and dots with a padlock on its front. It floats above a glowing network of dots and lines.
 category iconThreat Research April 7, 2026

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

  • Agentcore
  • Agentcore runtime
  • AWS
Read now
 category iconThreat Research April 6, 2026

Understanding Current Threats to Kubernetes Environments

  • Audit logs
  • Cloud
  • Containers
Read now
Pictorial representation of Amazon Bedrock's multi-agent applications. A digital illustration depicting complex data flow and connectivity. Numerous lines and nodes extend outward from a central point, resembling a neural network or digital web, against a dark background.
 category iconThreat Research April 3, 2026

When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications

  • AI
  • Amazon
  • Bedrock
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2026 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow