{"id":4646,"date":"2026-02-07T06:00:00","date_gmt":"2026-02-07T14:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=4646"},"modified":"2026-02-07T17:04:58","modified_gmt":"2026-02-08T01:04:58","slug":"the-dawn-of-the-autonomous-agent-when-ai-starts-attacking","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/","title":{"rendered":"The Dawn of the Autonomous Agent: When AI Starts Attacking"},"content":{"rendered":"\n<p>For the entire history of cybersecurity, human speed has always been a bottleneck, <em>somewhere<\/em> in the system. Whether it was a lone hacker or a nation-state team, scripting and automation could not bypass the human element necessary to plan, coordinate, interpret and execute attack objectives. Consequently, the overall speed of an attack could only progress as fast as the person behind the keyboard.<\/p>\n\n\n\n<p>That era is rapidly fading. We are now witnessing the undeniable rise of agentic AI. Shedding light on its use, Anthropic recently released <a href=\"https:\/\/assets.anthropic.com\/m\/ec212e6566a0d47\/original\/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf\">a landmark report<\/a>, which details the disruption of a cyberespionage operation orchestrated by AI agents on behalf of a group referred to as GTG-1002. The AI in this campaign followed a script and autonomously orchestrated the attack. It also mapped attack surfaces, exploited vulnerabilities, moved laterally and conducted intelligence analysis \u2014 all at machine speed.<\/p>\n\n\n\n<p>Beyond just an upgrade in tool sets, this campaign completely changes the dynamics of cyberwarfare. The adversary no longer sleeps or needs a human so it can connect disparate pieces of information purposefully and faster than ever before.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Invisible Evolution<\/h2>\n\n\n\n<p>To understand where we are going, we must recognize how the board has shifted. In AI\u2019s infancy, its success was limited to narrow, structured tasks. As large language models (LLMs) evolved, they gained the ability to generalize across complex, unstructured data. We saw this first in defense \u2014 automated patching, code generation and vulnerability identification.<\/p>\n\n\n\n<p>Now, the dual nature of powerful LLMs is coming home to roost, birthing a new anatomy of algorithmic threat that disrupts and defuses core processes in traditional defense.<\/p>\n\n\n\n<p>An autonomous offensive LLM agent, unlike traditional malware, requires no command and control infrastructure because the agent is the command and control. It analyzes network topology, understands business processes, and autonomously decides how to move laterally toward critical assets. And, it doesn\u2019t need a human controller because it simply thinks.<\/p>\n\n\n\n<p>Once inside, this agent employs a new form of dynamic persistence. We often worry about \u201cadversarial examples\u201d \u2014 like tricking a sensor with pixel noise \u2014 but that\u2019s just one parlor trick in the agent\u2019s toolbox. The true threat is from the holistic set of an agent using the toolbox. Because an autonomous agent acts with a comprehensive, adaptive logic, it can overwhelm human control points with sheer speed, hiding its actions in the raw noise of logs where human analysts cannot connect the dots fast enough. It also maintains a holistic view of the target, correlating seemingly unrelated data points across the enterprise to find structural weaknesses that isolated defense strategies \u2014 human or otherwise \u2014 would not anticipate.<\/p>\n\n\n\n<p>Perhaps most insidious, however, is the potential for stealth within and across all phases of an attack. The silent persistence of an agent, maintaining context of the overall attack through markdown files, as observed in the GTG-1002 event, can conduct data poisoning or piecewise indirect exfiltration a drop at a time, or piggybacking within the routine dataflows. Unlike a loud, chaotic event like a Network Mapper (Nmap) scan, this attack is a low, slow and nearly undetectable shift in how an offensive entity can maliciously influence processes and extract value from your organization\u2019s greatest intellectual assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Death of the Grace Period<\/h2>\n\n\n\n<p>We need to be clear that agentic AI breaks the \u201cgrace period.\u201d<\/p>\n\n\n\n<p>Defenders for decades have enjoyed a lag time between the publication of a common vulnerability and exposure (CVE) and the weaponization of an exploit. That gap allowed teams to patch, test and deploy fixes. With autonomous agents, that gap is downgraded to zero.<\/p>\n\n\n\n<p>An agent capable of reading a CVE, writing code and validating an exploit can weaponize public information faster than any human team can read the report. Recent research has demonstrated AI systems capable of generating functional exploits for new CVEs in as little as 15 minutes, turning our own transparency into a vulnerability.<sup><a href=\"#foot-notes\">1<\/a><\/sup> The detailed roadmaps we publish to help defenders now fuel the exact agents we are fighting.<\/p>\n\n\n\n<p>This shift requires a new rule of engagement: Data privacy is a necessary layer of defense. We must fundamentally rethink how we share data, which becomes a question of capacity. If an AI agent identifies a thousand vulnerabilities in a single hour, the act of \u201cresponsible disclosure\u201d becomes a Denial-of-Service attack on the remediation process. Human teams simply cannot metabolize risk at that volume. Other data that could be used in social engineering or credential stealing can be pulled into attack chains with greater efficiency. Broadcasting our weaknesses to the world assumes the adversary is slow enough, and the list of problems short enough, for us to win the foot race. Humans will always lose this race when up against an autonomous agent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Adapting at Machine Speed<\/h2>\n\n\n\n<p>Leading through this transition demands a shift in operational philosophy. The ambiguity of the threat timeline \u2014 whether it matures in six months or six years \u2014 is a test of strategic foresight, not a permission slip to delay.&nbsp;<\/p>\n\n\n\n<p>To survive, leaders must first escape the trap of treating legacy infrastructure as a permanent asset. Naturally we want to protect the investments we have made, but in an autonomous environment, any siloed tool that adds latency is a liability. An agent exploits the milliseconds it takes to correlate a network signal with an endpoint alert. Holding onto these tools because of their \u201csunk cost\u201d is a strategic error. If a tool cannot operate at machine speed, it is unequivocally a liability.<\/p>\n\n\n\n<p>In order to do this, though, organizations must embrace a nonlinear approach to modernization. Attackers do not incrementally improve their scripts; they leapfrog to autonomous orchestration. Defenders must match that trajectory. We must stop allocating resources to reshape and prolong legacy products that were never designed for this era. The focus must shift entirely from maintaining the old processes to R&amp;D for the new needs of the autonomous age. You cannot defeat an exponential threat with a linear upgrade path.<\/p>\n\n\n\n<p>Ultimately, we must learn to lead through uncertainty. Traditional management models often demand floodlights \u2014 full clarity, guaranteed ROI and predictable outcomes before approving a budget. But agentic AI is an adaptive, rapidly evolving threat. If you wait for a fully illuminated plan, you are already behind. Leaders must become comfortable operating with a \u201cdim flashlight,\u201d seeing only the next few steps but moving with conviction. The goal is continuous adaptation, not perfect clarity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Be the Red Team<\/h2>\n\n\n\n<p>Fundamentally, we must change how we test our own resilience. Professional red teaming is often limited to narrow domain experts evaluating isolated systems. This approach creates a dangerous blind spot. We need diverse teams for the sake of variety and because testing bits in isolation fails to expose the systemic vulnerabilities that an agent can connect across subcomponents. While unstructured hackathon events might bring together more diverse perspectives, relying on ad hoc efforts performed at the margins of the workday is insufficient to create structured, systematic assessments.<\/p>\n\n\n\n<p>We must invest in dedicated, diverse teams whose sole job is to start from scratch and learn how to be the attackers of this new era. We need to anticipate where current defenses will fail before an autonomous agent finds those cracks in the wild.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Leadership in the Age of Agentic AI<\/h2>\n\n\n\n<p>The rise of agentic AI risk marks the inevitable next chapter in cybersecurity. But, realizing the promise of an autonomous defense requires a decisive shift in how the enterprise buys, builds and deploys security.<\/p>\n\n\n\n<p>The boardroom\u2019s priority is to intentionally remove the strategic friction of adoption \u2014 shifting risk tolerance and expediting budget approvals that often stall innovation. This top-down clarity empowers managers to tackle the operational friction, giving R&amp;D teams the specific mandate to leverage AI, study the new battlefield and build robust autonomous defensive agents. The capacity to execute this plan requires new performance goals. They must allow risk and failure so teams can quickly assess a wide set of options with technical depth and curiosity, but without being slowed down by procurement processes or assurances of success that cannot be made.<\/p>\n\n\n\n<p>The question has shifted from <em>when<\/em> this battle will be fought to <em>how<\/em> you choose to prepare for it. Will you look backwards at past resilience, confident that it has gotten you too far to fail? As we see our adversaries playing chess to our checkers, how will you enable your teams to learn this new game and level up?<\/p>\n\n\n\n<p>The move is yours.<\/p>\n\n\n\n<p>Curious about what else Nicole has to say? Check out her other articles on <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/author\/dr-nicole-nichols\/\">Perspectives<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-small-font-size\" id=\"foot-notes\"><sup>1<\/sup> Mayura Kathir, \u201c<a href=\"https:\/\/cyberpress.org\/ai-systems-can-craft-exploits\/\">AI Systems Can Craft Exploits for Known CVEs in Minutes<\/a>,\u201d Cyber Press, August 22, 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to fight back when the adversary moves at machine speed.<\/p>\n","protected":false},"author":1,"featured_media":4647,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,15],"tags":[],"coauthors":[180],"class_list":["post-4646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Dawn of the Autonomous Agent: When AI Starts Attacking - Perspectives<\/title>\n<meta name=\"description\" content=\"How to fight back when the adversary moves at machine speed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dawn of the Autonomous Agent: When AI Starts Attacking - Perspectives\" \/>\n<meta property=\"og:description\" content=\"How to fight back when the adversary moves at machine speed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-07T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-08T01:04:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dr. Nicole Nichols\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"The Dawn of the Autonomous Agent: When AI Starts Attacking\",\"datePublished\":\"2026-02-07T14:00:00+00:00\",\"dateModified\":\"2026-02-08T01:04:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\"},\"wordCount\":1445,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg\",\"articleSection\":[\"AI\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\",\"name\":\"The Dawn of the Autonomous Agent: When AI Starts Attacking - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg\",\"datePublished\":\"2026-02-07T14:00:00+00:00\",\"dateModified\":\"2026-02-08T01:04:58+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"How to fight back when the adversary moves at machine speed.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dawn of the Autonomous Agent: When AI Starts Attacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dawn of the Autonomous Agent: When AI Starts Attacking - Perspectives","description":"How to fight back when the adversary moves at machine speed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/","og_locale":"en_US","og_type":"article","og_title":"The Dawn of the Autonomous Agent: When AI Starts Attacking - Perspectives","og_description":"How to fight back when the adversary moves at machine speed.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/","og_site_name":"Perspectives","article_published_time":"2026-02-07T14:00:00+00:00","article_modified_time":"2026-02-08T01:04:58+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg","type":"image\/jpeg"}],"author":"Dr. Nicole Nichols","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"The Dawn of the Autonomous Agent: When AI Starts Attacking","datePublished":"2026-02-07T14:00:00+00:00","dateModified":"2026-02-08T01:04:58+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/"},"wordCount":1445,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg","articleSection":["AI","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/","name":"The Dawn of the Autonomous Agent: When AI Starts Attacking - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg","datePublished":"2026-02-07T14:00:00+00:00","dateModified":"2026-02-08T01:04:58+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"How to fight back when the adversary moves at machine speed.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2026\/01\/Dawn-of-the-Autonomous-Agent-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/the-dawn-of-the-autonomous-agent-when-ai-starts-attacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"The Dawn of the Autonomous Agent: When AI Starts Attacking"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=4646"}],"version-history":[{"count":4,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4646\/revisions"}],"predecessor-version":[{"id":4666,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/4646\/revisions\/4666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/4647"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=4646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=4646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=4646"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=4646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}