Radware reveals the ZombieAgent zero-click vulnerability in AI agents, potentially enabling invisible data theft and persistent control.
Quiver AI Summary
Radware has uncovered a new zero-click indirect prompt injection vulnerability named ZombieAgent that targets OpenAI's Deep Research agent. This vulnerability poses significant risks to enterprises, allowing invisible data theft and persistent agent hijacking without user interaction. ZombieAgent can embed malicious directives within everyday communication, enabling attackers to manipulate AI agent behavior, collect sensitive information, and propagate attacks across networks. The discovery highlights a critical gap in security, as these actions occur within OpenAI's cloud infrastructure, bypassing traditional security measures. Radware emphasizes the need for heightened awareness and security practices around AI agents, and will hold a webinar on January 20, 2026, to discuss the implications and best practices for safeguarding against such vulnerabilities.
Potential Positives
- Radware's discovery of the ZombieAgent vulnerability highlights the company's position as a leader in cybersecurity research and threat intelligence, reinforcing its role in protecting enterprises against emerging threats.
- The responsible disclosure to OpenAI demonstrates Radware's commitment to collaboration in the cybersecurity community, promoting awareness and proactive security measures against AI-related vulnerabilities.
- Radware's upcoming webinar on ZombieAgent provides an opportunity for industry leaders to gain critical insights and best practices, potentially enhancing customer engagement and positioning Radware as a thought leader in AI security.
Potential Negatives
- The vulnerability disclosure indicates a major security flaw in Radware's technology that could lead to data breaches and exploitation of sensitive information, potentially damaging customer trust and brand reputation.
- The lack of visibility into how AI agents process untrusted content represents a systemic issue within Radware's application security solutions, raising concerns about the effectiveness of their current protective measures.
- ZombieAgent’s ability to propagate attacks invisibly within OpenAI's cloud infrastructure highlights a significant limitation in Radware's existing security framework, which could undermine their position as a leader in the cybersecurity market.
FAQ
What is ZombieAgent vulnerability?
ZombieAgent is a zero-click indirect prompt injection vulnerability affecting OpenAI's Deep Research agent, enabling invisible data theft and agent hijacking.
How does ZombieAgent exploit AI agents?
ZombieAgent embeds hidden commands in emails or documents, allowing malicious actions to occur without user interaction, leveraging the AI's cloud infrastructure.
What are the risks associated with ZombieAgent?
The risks include ongoing data exfiltration, persistent agent control, and difficulty in detecting attacks due to invisibility in cloud operations.
How can organizations protect against ZombieAgent?
Organizations should enhance visibility into agent behavior, implement robust security protocols, and stay informed on best practices for securing AI technologies.
Where can I learn more about ZombieAgent?
For detailed information, refer to Radware's Threat Advisory and attend their upcoming webinar on securing AI agents against vulnerabilities.
Disclaimer: This is an AI-generated summary of a press release distributed by GlobeNewswire. The model used to summarize this release may make mistakes. See the full release here.
$RDWR Hedge Fund Activity
We have seen 58 institutional investors add shares of $RDWR stock to their portfolio, and 50 decrease their positions in their most recent quarter.
Here are some of the largest recent moves:
- ARTISAN PARTNERS LIMITED PARTNERSHIP added 431,572 shares (+16.0%) to their portfolio in Q3 2025, for an estimated $11,432,342
- LEGAL & GENERAL GROUP PLC removed 395,594 shares (-14.0%) from their portfolio in Q3 2025, for an estimated $10,479,285
- PENSERRA CAPITAL MANAGEMENT LLC removed 341,604 shares (-11.8%) from their portfolio in Q3 2025, for an estimated $9,049,089
- MORGAN STANLEY removed 217,945 shares (-9.7%) from their portfolio in Q3 2025, for an estimated $5,773,363
- MAN GROUP PLC added 161,159 shares (+59.5%) to their portfolio in Q3 2025, for an estimated $4,269,101
- RENAISSANCE TECHNOLOGIES LLC added 145,500 shares (+9.0%) to their portfolio in Q3 2025, for an estimated $3,854,295
- NUVEEN, LLC added 129,399 shares (+57.0%) to their portfolio in Q3 2025, for an estimated $3,427,779
To track hedge funds' stock portfolios, check out Quiver Quantitative's institutional holdings dashboard.
$RDWR Analyst Ratings
Wall Street analysts have issued reports on $RDWR in the last several months. We have seen 1 firms issue buy ratings on the stock, and 0 firms issue sell ratings.
Here are some recent analyst ratings:
- Barclays issued a "Overweight" rating on 07/31/2025
To track analyst ratings and price targets for $RDWR, check out Quiver Quantitative's $RDWR forecast page.
$RDWR Price Targets
Multiple analysts have issued price targets for $RDWR recently. We have seen 2 analysts offer price targets for $RDWR in the last 6 months, with a median target of $32.5.
Here are some recent targets:
- Tavy Rosner from Barclays set a target price of $35.0 on 07/31/2025
- Joseph Gallo from Jefferies set a target price of $30.0 on 07/24/2025
Full Release
MAHWAH, N.J., Jan. 08, 2026 (GLOBE NEWSWIRE) -- Radware ® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the discovery of ZombieAgent, a new zero-click indirect prompt injection (IPI) vulnerability targeting OpenAI’s Deep Research agent. The vulnerability could expose enterprises to invisible data theft, persistent agent hijacking, and service-side execution that could bypass an organization’s security controls.
Persistent Memory Manipulation and Autonomous Propagation
ZombieAgent initially resembles Radware’s previously disclosed ShadowLeak vulnerability , which shows how indirect prompt injection techniques could be used to influence the behavior of AI agents. However, Radware’s researchers also identified a more advanced attack stage in which ZombieAgent implants malicious rules directly into an agent’s long-term memory or working notes. This allows the attacker to establish persistence without re-engaging the target. It executes hidden actions every time the agent is used, silently collecting sensitive information over time. It is also capable of propagating the attack across additional contacts or email recipients.
A single malicious email could therefore become the entry point to a growing, automated, worm-like campaign inside the organization and beyond.
“ZombieAgent illustrates a critical structural weakness in today’s agentic AI platforms,” said Pascal Geenens, vice president, threat intelligence, Radware. “Enterprises rely on these agents to make decisions and access sensitive systems, but they lack visibility into how agents interpret untrusted content or what actions they execute in the cloud. This creates a dangerous blind spot that attackers are already exploiting.”
Zero-Click Exploitation Through Hidden Instructions
Leveraging techniques learned from ShadowLeak, Radware’s threat intelligence research team discovered the new flaw in the guardrails deployed to protect against prompt injection vulnerabilities. Attackers can embed hidden directives into everyday emails, documents, or webpages. When an AI agent processes this content—such as during routine inbox summarization—the agent interprets the concealed instructions as legitimate commands. Once activated, the compromised agent could collect mailbox data, access sensitive files, and communicate with external servers. No user interaction is required and no “click” is needed to trigger the attack.
A defining characteristic of ZombieAgent is that all malicious actions occur within OpenAI’s cloud infrastructure, not the user’s device, nor the companies’ IT environment. As a result, no endpoint logs record the activity. No network traffic passes through corporate security stacks. No traditional security tools such as secure web gateways, endpoint detection and response or firewalls detect the sensitive data exfiltration. Therefore, no traditional alert indicates the compromise to the user. This cloud-side invisibility could make ZombieAgent exceptionally difficult to detect or stop using existing enterprise controls.
ZombieAgent builds on Radware’s earlier “ ShadowLeak” findings, further demonstrating how easily attackers can exploit the rapidly expanding “agentic threat surface,” where AI agents read emails, interact with corporate systems, initiate workflows, and make decisions autonomously. Radware disclosed the vulnerability to OpenAI under responsible disclosure protocols.
For more information, review Radware’s latest Threat Advisory and Blog article, “ZombieAgent: The Agentic Revolution Comes with Malicious Gifts.”
Radware Webinar on ZombieAgent
Radware will host a live webinar on January 20, 2026, “
ZombieAgent: New ChatGPT Vulnerabilities Let Data Theft Continue (and Spread)
”
Security leaders and AI developers are invited to attend and explore the anatomy of the ZombieAgent attack, best practices for securing AI agents and the future of responsible AI threat research.
Radware conducts threat research on behalf of the wider cybersecurity community, ensuring security professionals have the same insights as attackers. The complete research, including technical breakdowns and defense recommendations, will be available at Radware’s Security Research Center following the webinar.
About Radware
Radware
®
(NASDAQ: RDWR) is a global leader in application security and delivery solutions for multi-cloud environments. The company’s cloud application, infrastructure, and API security solutions use AI-driven algorithms for precise, hands-free, real-time protection from the most sophisticated web, application, and DDoS attacks, API abuse, and bad bots. Enterprises and carriers worldwide rely on Radware’s solutions to address evolving cybersecurity challenges and protect their brands and business operations while reducing costs. For more information, please visit the
Radware
website.
Radware encourages you to join our community and follow us on:
Facebook
,
LinkedIn
,
Radware Blog
,
X
, and
YouTube
.
©2026 Radware Ltd. All rights reserved. Any Radware products and solutions mentioned in this press release are protected by trademarks, patents, and pending patent applications of Radware in the U.S. and other countries. For more details, please see: https://www.radware.com/LegalNotice/ . All other trademarks and names are property of their respective owners.
Radware believes the information in this document is accurate in all material respects as of its publication date. However, the information is provided without any express, statutory, or implied warranties and is subject to change without notice.
The contents of any website or hyperlinks mentioned in this press release are for informational purposes and the contents thereof are not part of this press release.
Safe Harbor Statement
This press release includes “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements made herein that are not statements of historical fact, including statements about Radware’s plans, outlook, beliefs, or opinions, are forward-looking statements. Generally, forward-looking statements may be identified by words such as “believes,” “expects,” “anticipates,” “intends,” “estimates,” “plans,” and similar expressions or future or conditional verbs such as “will,” “should,” “would,” “may,” and “could.” For example, when we say in this press release that enterprises rely on agentic AI platforms to make decisions and access sensitive systems, but they lack visibility into how agents interpret untrusted content or what actions they execute in the cloud and that this creates a dangerous blind spot that attackers are already exploiting, we are using forward-looking statements. Because such statements deal with future events, they are subject to various risks and uncertainties, and actual results, expressed or implied by such forward-looking statements, could differ materially from Radware’s current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to: the impact of global economic conditions, including as a result of the state of war declared in Israel in October 2023 and instability in the Middle East, the war in Ukraine, tensions between China and Taiwan, financial and credit market fluctuations (including elevated interest rates), impacts from tariffs or other trade restrictions, inflation, and the potential for regional or global recessions; our dependence on independent distributors to sell our products; our ability to manage our anticipated growth effectively; our business may be affected by sanctions, export controls, and similar measures, targeting Russia and other countries and territories, as well as other responses to Russia’s military conflict in Ukraine, including indefinite suspension of operations in Russia and dealings with Russian entities by many multi-national businesses across a variety of industries; the ability of vendors to provide our hardware platforms and components for the manufacture of our products; our ability to attract, train, and retain highly qualified personnel; intense competition in the market for cybersecurity and application delivery solutions and in our industry in general, and changes in the competitive landscape; our ability to develop new solutions and enhance existing solutions; the impact to our reputation and business in the event of real or perceived shortcomings, defects, or vulnerabilities in our solutions, if our end-users experience security breaches, or if our information technology systems and data, or those of our service providers and other contractors, are compromised by cyber-attackers or other malicious actors or by a critical system failure; our use of AI technologies that present regulatory, litigation, and reputational risks; risks related to the fact that our products must interoperate with operating systems, software applications and hardware that are developed by others; outages, interruptions, or delays in hosting services; the risks associated with our global operations, such as difficulties and costs of staffing and managing foreign operations, compliance costs arising from host country laws or regulations, partial or total expropriation, export duties and quotas, local tax exposure, economic or political instability, including as a result of insurrection, war, natural disasters, and major environmental, climate, or public health concerns; our net losses in the past and the possibility that we may incur losses in the future; a slowdown in the growth of the cybersecurity and application delivery solutions market or in the development of the market for our cloud-based solutions; long sales cycles for our solutions; risks and uncertainties relating to acquisitions or other investments; risks associated with doing business in countries with a history of corruption or with foreign governments; changes in foreign currency exchange rates; risks associated with undetected defects or errors in our products; our ability to protect our proprietary technology; intellectual property infringement claims made by third parties; laws, regulations, and industry standards affecting our business; compliance with open source and third-party licenses; complications with the design or implementation of our new enterprise resource planning (“ERP”) system; our reliance on information technology systems; our ESG disclosures and initiatives; and other factors and risks over which we may have little or no control. This list is intended to identify only certain of the principal factors that could cause actual results to differ. For a more detailed description of the risks and uncertainties affecting Radware, refer to Radware’s Annual Report on Form 20-F, filed with the Securities and Exchange Commission (SEC), and the other risk factors discussed from time to time by Radware in reports filed with, or furnished to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware’s public filings are available from the SEC’s website at
www.sec.gov
or may be obtained on Radware’s website at
www.radware.com
.
Media Contact:
Gina Sorice
Radware
[email protected]
A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/e3d98be3-0ca0-464c-9ca5-971e0bfdc842