Researchers have uncovered an upsurge in authentication coercion cyber-attacks that abuse Windows Remote Procedure Call (RPC) mechanisms that force systems into sending their credentials to an attacker-controlled system.
You can find out more via this Palo Alto Unit 42 Blog post: https://unit42.paloaltonetworks.com/authentication-coercion/
Jim Routh, Chief Trust Officer at Saviynt, commented:
“Authentication coercion attacks represent a particularly challenging attack vector for enterprises that rely on extensive use of Microsoft architecture and products. These attacks enable lateral movement with limited visibility for the enterprise. There are several remediation steps recommended that generally require strict adherence to limits in how RPC (remote procedure call) is used within the enterprise. The larger and more complex the enterprise, the more difficult it is to enforce the limitations of RPC.
“Enterprises should consider more maturity in how privileged access management (PAM) works, including the use of continuous validation techniques that compare attributes from data streams to established patterns. These techniques measure the deviation from the established pattern mathematically. The deviation threshold (number or score) can trigger automated workflows that restrict access (lateral movement) within milliseconds of an attack attempt. This type of capability is not dependent on humans to detect the threats. It is similar to the way our body’s immune system operates when exposed to bacteria or a virus. Our body’s immune system automatically produces white blood cells and antibodies to attack the bacterial infection. Continuous validation techniques represent a digital immune system response that can take action in milliseconds when lateral movement is automatically identified.”
This is another big hint that organizations need to look at making sure that users are only able to do what they need to do and nothing more. That would make attacks like these way less effective.
Palo Alto Networks Unit 42 Says That A Chrome CVE Can Allow Hijacking Of The In-Browser AI Assistant
Posted in Commentary with tags Palo Alto on March 2, 2026 by itnerdThe new wave of agentic browsers brings the promise of transforming the way we use our computers and experience the internet, with AI-driven tools that interact with websites, fill out forms and manage workflows on our behalf. But with these experiential benefits, also come profound new cybersecurity challenges.
Unit 42 researchers at Palo Alto Networks released new research on a high-severity vulnerability (CVE-2026-0628) they discovered in Google’s new Gemini Live in Chrome feature that could allow malicious extensions with basic permissions to ‘hijack’ the new in-browser AI assistant, granting attackers access to webcams, microphones, and private files.
Palo Alto Networks researchers shared the issue with Google in October via coordinated vulnerability disclosure and Google issued a fix in early January. But, this discovery underscores a growing security paradox: as tech giants rush to turn browsers into powerful AI agents, they are inadvertently opening new backdoors to sensitive personal data.
The research is live here: http://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking
Leave a comment »