Apple reveals multimodal ambitions deeper than anyone expected. The first documented agent-to-agent social engineering attack lands at a Fortune 500. And Perplexity makes a serious play for enterprise search. The AI security conversation just changed permanently.
Security researchers at Wiz published a post-mortem on an incident where a malicious payload embedded in a supplier's email was ingested by an enterprise's procurement agent, which then used that context to send a convincingly crafted message to an internal HR agent — successfully extracting access credentials for an onboarding system. No human was involved in the attack chain from initial injection to credential exfiltration. The procurement agent was never compromised; it was operated exactly as designed. It just didn't know it was being used as a weapon.
The attack exploited a well-understood vulnerability — prompt injection — but at a level of orchestration that security teams haven't modeled before. The threat model for agentic AI isn't just "what can an adversary do to an agent." It's "what can an adversary do through an agent, to other agents."
Apple quietly dropped a developer preview update to Apple Intelligence that goes significantly further than expected: on-device AI can now read and interact with any visible UI element across the OS, including third-party applications, without requiring developer API integration. The feature — internally called "Ferret Actions" — uses the device's screen understanding model to bootstrap capability into any app without special hooks.
This directly threatens the "AI wrapper" business model. If Apple's on-device model can autonomously interact with existing apps, you don't need a separate AI-native version of the same tool. You just need the original tool and Apple's layer on top.
apple.com ↗Perplexity announced Enterprise Pro, a tier aimed directly at knowledge workers in finance, consulting, and law who currently pay $10K–$50K annually for analyst research subscriptions. The product combines real-time web search with curated document analysis and cites every claim with primary sources by default. Early reviews from beta users in private equity suggest it already replaces meaningful portions of first-pass research that previously required a junior analyst.
perplexity.ai ↗The Apple and agent security stories are the same story from opposite directions. Apple Ferret Actions says: AI can now interface with anything, without asking permission. The Wiz agent attack says: yes, and so can adversaries using that same property as a vector.
The capability expansion is real and accelerating. The security models haven't kept up. That gap — between what agents can do and what enterprises have built defenses against — is both the consulting opportunity and the genuine risk. Any organization deploying agents with access to internal systems in 2026 needs a threat model that treats other agents as potential adversaries, not just external networks.
For NI's positioning: we should be thinking about how to articulate "agentic trust architecture" as a core offering. It's not a product yet, but it's a conversation that every CISO is about to need to have.