<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Unit 42</title>
	<atom:link href="https://unit42.paloaltonetworks.com/feed/?v=2" rel="self" type="application/rss+xml"/>
	<link>https://unit42.paloaltonetworks.com/</link>
	<description>Palo Alto Networks</description>
	<lastBuildDate>Mon, 04 May 2026 18:46:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/icon-Unit42-180x180-1.png</url>
	<title>Unit 42</title>
	<link>https://unit42.paloaltonetworks.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<itunes:explicit>no</itunes:explicit><itunes:subtitle>Palo Alto Networks</itunes:subtitle><item>
		<title>The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)</title>
		<link>https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/</link>
		
		<dc:creator><![CDATA[Unit 42]]></dc:creator>
		<pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate>
				<category><![CDATA[High Profile Threats]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Credential Harvesting]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[obfuscation]]></category>
		<category><![CDATA[payload]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[worm propagation]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=179395</guid>

					<description><![CDATA[<p>Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. </p>
<p>The post <a href="https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/">The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>15</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/05_Malware_Category_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>15</dcterms:extent>
		<enclosure length="611893" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/05_Malware_Category_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) appeared first on Unit 42.</itunes:summary><itunes:keywords>High Profile Threats, Malware, Credential Harvesting, GitHub, npm packages, obfuscation, payload, supply chain, worm propagation</itunes:keywords></item>
		<item>
		<title>Essential Data Sources for Detection Beyond the Endpoint</title>
		<link>https://unit42.paloaltonetworks.com/detection-beyond-the-endpoint/</link>
		
		<dc:creator><![CDATA[Corey Berman and Matt Gayford]]></dc:creator>
		<pubDate>Fri, 01 May 2026 23:00:13 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[threat detection]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=180120</guid>

					<description><![CDATA[<p>Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/detection-beyond-the-endpoint/">Essential Data Sources for Detection Beyond the Endpoint</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>4</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/13_Cloud_cybersecurity_research_Overview_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>4</dcterms:extent>
		<enclosure length="837387" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/13_Cloud_cybersecurity_research_Overview_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data Sources for Detection Beyond the Endpoint appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data Sources for Detection Beyond the Endpoint appeared first on Unit 42.</itunes:summary><itunes:keywords>General, Insights, Cloud Security, IAM, incident response, threat detection</itunes:keywords></item>
		<item>
		<title>That AI Extension Helping You Write Emails? It’s Reading Them First</title>
		<link>https://unit42.paloaltonetworks.com/high-risk-gen-ai-browser-extensions/</link>
		
		<dc:creator><![CDATA[Shresta Bellary Seetharam, Nabeel Mohamed, Billy Melicher, Oleksii Starov, Qinge Xie and Fang Liu]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 22:00:57 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[AI browser]]></category>
		<category><![CDATA[browser extension]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[Infostealer]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Remote Access Trojan]]></category>
		<category><![CDATA[search hijacker]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=179576</guid>

					<description><![CDATA[<p>Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/high-risk-gen-ai-browser-extensions/">That AI Extension Helping You Write Emails? It’s Reading Them First</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>13</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/AdobeStock_739390615-1-300x300.jpg</featuredImage>
		<dcterms:extent>13</dcterms:extent>
		<enclosure length="760563" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/AdobeStock_739390615-1.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser. The post That AI Extension Helping You Write Emails? It’s Reading Them First appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser. The post That AI Extension Helping You Write Emails? It’s Reading Them First appeared first on Unit 42.</itunes:summary><itunes:keywords>Malware, Threat Research, AI browser, browser extension, GenAI, Infostealer, malware, Remote Access Trojan, search hijacker, spyware</itunes:keywords></item>
		<item>
		<title>TGR-STA-1030: New Activity in Central and South America</title>
		<link>https://unit42.paloaltonetworks.com/new-activity-central-south-america/</link>
		
		<dc:creator><![CDATA[Unit 42]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 20:30:19 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[TGR-STA-1030]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=179467</guid>

					<description><![CDATA[<p>Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/new-activity-central-south-america/">TGR-STA-1030: New Activity in Central and South America</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>1</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/01_Nation-State-cyberattacks_1505x922-300x300.jpg</featuredImage>
		<dcterms:extent>1</dcterms:extent>
		<enclosure length="895709" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/01_Nation-State-cyberattacks_1505x922.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.</itunes:summary><itunes:keywords>General, Insights, TGR-STA-1030</itunes:keywords></item>
		<item>
		<title>Frontier AI and the Future of Defense: Your Top Questions Answered</title>
		<link>https://unit42.paloaltonetworks.com/frontier-ai-top-questions-answered/</link>
		
		<dc:creator><![CDATA[Sam Rubin]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 20:45:50 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[n-day]]></category>
		<category><![CDATA[open source]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=179376</guid>

					<description><![CDATA[<p>What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/frontier-ai-top-questions-answered/">Frontier AI and the Future of Defense: Your Top Questions Answered</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>4</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/03_Listicle_Overview_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>4</dcterms:extent>
		<enclosure length="1082016" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/03_Listicle_Overview_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first on Unit 42.</itunes:subtitle><itunes:summary>What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first on Unit 42.</itunes:summary><itunes:keywords>General, Insights, GenAI, LLM, n-day, open source</itunes:keywords></item>
		<item>
		<title>Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System</title>
		<link>https://unit42.paloaltonetworks.com/autonomous-ai-cloud-attacks/</link>
		
		<dc:creator><![CDATA[Yahav Festinger and Chen Doytshman]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 10:00:31 +0000</pubDate>
				<category><![CDATA[Cloud Cybersecurity Research]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[GCP]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[LLMs]]></category>
		<category><![CDATA[multi-agent]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=178504</guid>

					<description><![CDATA[<p>Unit 42 reveals how multi-agent AI systems can autonomously attack cloud environments. Learn critical insights and vital lessons for proactive security. </p>
<p>The post <a href="https://unit42.paloaltonetworks.com/autonomous-ai-cloud-attacks/">Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>12</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/12_Cloud_cybersecurity_research_Overview_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>12</dcterms:extent>
		<enclosure length="1163529" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/12_Cloud_cybersecurity_research_Overview_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 reveals how multi-agent AI systems can autonomously attack cloud environments. Learn critical insights and vital lessons for proactive security. The post Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 reveals how multi-agent AI systems can autonomously attack cloud environments. Learn critical insights and vital lessons for proactive security. The post Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System appeared first on Unit 42.</itunes:summary><itunes:keywords>Cloud Cybersecurity Research, Threat Research, AI, Cloud, data exfiltration, GCP, Google Cloud, LLMs, multi-agent, penetration testing</itunes:keywords></item>
		<item>
		<title>When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks</title>
		<link>https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/</link>
		
		<dc:creator><![CDATA[Emmanuel Zhou, Adam Robbie, Rick Wyble, Zhutian Liu, Zhiyun Qian, Zhaowei Tan, Srikanth V. Krishnamurthy and Mathy Vanhoef]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 10:00:22 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[AirSnitch]]></category>
		<category><![CDATA[MitM]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[port stealing]]></category>
		<category><![CDATA[WiFi encryption]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[WPA2]]></category>
		<category><![CDATA[WPA3]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=178804</guid>

					<description><![CDATA[<p>Unit 42 research reveals AirSnitch attacks bypass WPA2/3 Wi-Fi encryption and client isolation, exposing critical infrastructure vulnerabilities.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/">When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>12</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/11_Security-Technology_Category_1505x922-300x300.jpg</featuredImage>
		<dcterms:extent>12</dcterms:extent>
		<enclosure length="1020703" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/11_Security-Technology_Category_1505x922.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 research reveals AirSnitch attacks bypass WPA2/3 Wi-Fi encryption and client isolation, exposing critical infrastructure vulnerabilities. The post When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 research reveals AirSnitch attacks bypass WPA2/3 Wi-Fi encryption and client isolation, exposing critical infrastructure vulnerabilities. The post When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks appeared first on Unit 42.</itunes:summary><itunes:keywords>Malware, Threat Research, AirSnitch, MitM, network security, port stealing, WiFi encryption, wireless, WPA2, WPA3</itunes:keywords></item>
		<item>
		<title>Fracturing Software Security With Frontier AI Models</title>
		<link>https://unit42.paloaltonetworks.com/ai-software-security-risks/</link>
		
		<dc:creator><![CDATA[Andy Piazza]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 10:00:14 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[attack path]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[n-day]]></category>
		<category><![CDATA[Open Source Software]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=177819</guid>

					<description><![CDATA[<p>Unit 42 finds frontier AI models enhance vulnerability discovery, acting as full-spectrum security researchers. They enable autonomous zero-day discovery and faster N-day patching.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/ai-software-security-risks/">Fracturing Software Security With Frontier AI Models</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>6</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/06_General_Overview_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>6</dcterms:extent>
		<enclosure length="959184" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/06_General_Overview_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 finds frontier AI models enhance vulnerability discovery, acting as full-spectrum security researchers. They enable autonomous zero-day discovery and faster N-day patching. The post Fracturing Software Security With Frontier AI Models appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 finds frontier AI models enhance vulnerability discovery, acting as full-spectrum security researchers. They enable autonomous zero-day discovery and faster N-day patching. The post Fracturing Software Security With Frontier AI Models appeared first on Unit 42.</itunes:summary><itunes:keywords>General, Insights, AI, attack path, data exfiltration, malware, n-day, Open Source Software, zero-day</itunes:keywords></item>
		<item>
		<title>Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)</title>
		<link>https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/</link>
		
		<dc:creator><![CDATA[Unit 42]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:35:07 +0000</pubDate>
				<category><![CDATA[Hacktivism]]></category>
		<category><![CDATA[High Profile Threats]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[APK]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[hacktivism]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Tarnished Scorpius]]></category>
		<category><![CDATA[wiper]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=174415</guid>

					<description><![CDATA[<p>Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/">Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>14</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/12_Security-Technology_Category_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>14</dcterms:extent>
		<enclosure length="736161" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/03/12_Security-Technology_Category_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17) appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17) appeared first on Unit 42.</itunes:summary><itunes:keywords>Hacktivism, High Profile Threats, Malware, Ransomware, APK, DDoS attacks, GenAI, hacktivism, Iran, phishing, Tarnished Scorpius, wiper</itunes:keywords></item>
		<item>
		<title>A Deep Dive Into Attempted Exploitation of CVE-2023-33538</title>
		<link>https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/</link>
		
		<dc:creator><![CDATA[Asher Davila, Malav Vyas and Chris Navarrete]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 22:00:13 +0000</pubDate>
				<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Command injection]]></category>
		<category><![CDATA[CVE-2023-33538]]></category>
		<category><![CDATA[Mirai]]></category>
		<category><![CDATA[WiFi routers]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=177971</guid>

					<description><![CDATA[<p>CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/">A Deep Dive Into Attempted Exploitation of CVE-2023-33538</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>17</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/04_Vulnerabilities_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>17</dcterms:extent>
		<enclosure length="1023414" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/04_Vulnerabilities_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The post A Deep Dive Into Attempted Exploitation of CVE-2023-33538 appeared first on Unit 42.</itunes:subtitle><itunes:summary>CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The post A Deep Dive Into Attempted Exploitation of CVE-2023-33538 appeared first on Unit 42.</itunes:summary><itunes:keywords>Threat Research, Vulnerabilities, botnet, Command injection, CVE-2023-33538, Mirai, WiFi routers</itunes:keywords></item>
		<item>
		<title>Cracks in the Bedrock: Agent God Mode</title>
		<link>https://unit42.paloaltonetworks.com/exploit-of-aws-agentcore-iam-god-mode/</link>
		
		<dc:creator><![CDATA[Ori Hadad]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 22:00:51 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[agentcore]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[bedrock]]></category>
		<category><![CDATA[DNS tunneling]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[killchain]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[Sandbox]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=177420</guid>

					<description><![CDATA[<p>Unit 42 reveals "Agent God Mode" in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/exploit-of-aws-agentcore-iam-god-mode/">Cracks in the Bedrock: Agent God Mode</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>8</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/03_Cloud_cybersecurity_research_Category_1505x922-300x300.jpg</featuredImage>
		<dcterms:extent>8</dcterms:extent>
		<enclosure length="1110412" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/03_Cloud_cybersecurity_research_Category_1505x922.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 reveals "Agent God Mode" in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks. The post Cracks in the Bedrock: Agent God Mode appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 reveals "Agent God Mode" in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks. The post Cracks in the Bedrock: Agent God Mode appeared first on Unit 42.</itunes:summary><itunes:keywords>Malware, Threat Research, agentcore, AI agents, AWS, bedrock, DNS tunneling, exfiltration, IAM, identity, killchain, privilege escalation, Sandbox</itunes:keywords></item>
		<item>
		<title>Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox</title>
		<link>https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/</link>
		
		<dc:creator><![CDATA[Ori Hadad]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 22:00:11 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[agentcore]]></category>
		<category><![CDATA[agentcore runtime]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[DNS tunneling]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[Sandbox]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=177263</guid>

					<description><![CDATA[<p>Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. </p>
<p>The post <a href="https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/">Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>13</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/05_Cloud_cybersecurity_research_Overview_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>13</dcterms:extent>
		<enclosure length="1220686" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/05_Cloud_cybersecurity_research_Overview_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore's sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox appeared first on Unit 42.</itunes:summary><itunes:keywords>Malware, Threat Research, agentcore, agentcore runtime, AWS, DNS tunneling, GenAI, Sandbox</itunes:keywords></item>
		<item>
		<title>Understanding Current Threats to Kubernetes Environments</title>
		<link>https://unit42.paloaltonetworks.com/modern-kubernetes-threats/</link>
		
		<dc:creator><![CDATA[Eyal Rafian and Bill Batchelor]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 22:00:08 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[audit logs]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Containers]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[queries]]></category>
		<category><![CDATA[react server]]></category>
		<category><![CDATA[react2shell]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=177112</guid>

					<description><![CDATA[<p>Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/modern-kubernetes-threats/">Understanding Current Threats to Kubernetes Environments</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>20</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/03_Malware_Category_1920x900-3-300x300.jpg</featuredImage>
		<dcterms:extent>20</dcterms:extent>
		<enclosure length="874605" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/03_Malware_Category_1920x900-3.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments. The post Understanding Current Threats to Kubernetes Environments appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 uncovers escalating Kubernetes attacks, detailing how threat actors exploit identities and critical vulnerabilities to compromise cloud environments. The post Understanding Current Threats to Kubernetes Environments appeared first on Unit 42.</itunes:summary><itunes:keywords>Malware, Threat Research, audit logs, Cloud, Containers, Kubernetes, PowerShell, queries, react server, react2shell</itunes:keywords></item>
		<item>
		<title>When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications</title>
		<link>https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/</link>
		
		<dc:creator><![CDATA[Jay Chen and Royce Lu]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 22:00:38 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[bedrock]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[multi-agent]]></category>
		<category><![CDATA[payload]]></category>
		<category><![CDATA[prompt injection]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=176805</guid>

					<description><![CDATA[<p>Unit 42 research on multi-agent AI systems on Amazon Bedrock reveals new attack surfaces and prompt injection risks. Learn how to secure your AI applications.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/">When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock&#039;s Multi-Agent Applications</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>15</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/AdobeStock_260323351-2-300x300.jpg</featuredImage>
		<dcterms:extent>15</dcterms:extent>
		<enclosure length="1406659" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/AdobeStock_260323351-2.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 research on multi-agent AI systems on Amazon Bedrock reveals new attack surfaces and prompt injection risks. Learn how to secure your AI applications. The post When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock&amp;#039;s Multi-Agent Applications appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 research on multi-agent AI systems on Amazon Bedrock reveals new attack surfaces and prompt injection risks. Learn how to secure your AI applications. The post When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock&amp;#039;s Multi-Agent Applications appeared first on Unit 42.</itunes:summary><itunes:keywords>Malware, Threat Research, AI, Amazon, bedrock, guardrails, LLM, multi-agent, payload, prompt injection</itunes:keywords></item>
		<item>
		<title>Threat Brief: Widespread Impact of the Axios Supply Chain Attack</title>
		<link>https://unit42.paloaltonetworks.com/axios-supply-chain-attack/</link>
		
		<dc:creator><![CDATA[Unit 42]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 18:30:10 +0000</pubDate>
				<category><![CDATA[High Profile Threats]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[API attacks]]></category>
		<category><![CDATA[JavaScript]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[VBScript]]></category>
		<guid isPermaLink="false">https://unit42.paloaltonetworks.com/?p=176776</guid>

					<description><![CDATA[<p>Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup.</p>
<p>The post <a href="https://unit42.paloaltonetworks.com/axios-supply-chain-attack/">Threat Brief: Widespread Impact of the Axios Supply Chain Attack</a> appeared first on <a href="https://unit42.paloaltonetworks.com">Unit 42</a>.</p>
]]></description>
		
		
		
		<readTime>9</readTime>
		<featuredImage>https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/02_Security-Technology_Category_1920x900-300x300.jpg</featuredImage>
		<dcterms:extent>9</dcterms:extent>
		<enclosure length="1195358" type="image/jpeg" url="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/02_Security-Technology_Category_1920x900.jpg"/>
			<itunes:explicit/><itunes:subtitle>Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. The post Threat Brief: Widespread Impact of the Axios Supply Chain Attack appeared first on Unit 42.</itunes:subtitle><itunes:summary>Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. The post Threat Brief: Widespread Impact of the Axios Supply Chain Attack appeared first on Unit 42.</itunes:summary><itunes:keywords>High Profile Threats, Malware, API attacks, JavaScript, PowerShell, supply chain, Trojan, VBScript</itunes:keywords></item>
	</channel>
</rss>