Friday, 27 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > AI transforms ‘dangling DNS’ into automated data exfiltration pipeline
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

Last updated: March 6, 2026 4:04 pm
Published March 6, 2026
Share
URL HTTP Web Address
SHARE

The brand new hijacked web page has the right URL and would possibly even have the right content material on it. However there are additionally hidden prompts embedded within the HTML, SVG metadata or different invisible parts—prompts that the AI agent might interpret as professional directions.

Now the attacker might probably have entry to every thing the agent has entry to. In the meantime, brokers are getting smarter. Even when an agent doesn’t have entry to a selected company useful resource that the attacker desires, the agent would possibly be capable to work out learn how to get to it, and the corporate can be paying for the compute time it takes for the agent to determine it out.

“Infrastructure or code that’s left operational however not maintained and monitored is a traditional assault vector for cyber criminals,” says Steve Winterfeld, advisory CISO at Akamai.

As a CISO, he’s frequently battling with this type of cyber debt, he says. “And this challenge is shortly climbing to the highest of the listing to deal with.” Akamai itself has not too long ago added a brand new functionality to its DNS safety suite to fulfill this particular concern, he provides.

How huge a possible downside is that this? Final yr, safety analysis agency Watchtowr found 150 abandoned S3 buckets beforehand utilized in business and open-source software program merchandise, governments, and infrastructure pipelines, registered them, and noticed eight million requests over the subsequent two months for issues like software program updates, pre-compiled binaries, digital machine photos, and JavaScript recordsdata.

See also  New programme aims to support former athletes into data centre careers

Dangling DNS and subdomain takeovers have been utilized by attackers for over a decade, says Avinash Rajeev, chief of PwC’s cyber, information and tech danger platform. “It’s not a uncommon or extremely technical edge case.”

Source link

TAGGED: automated, dangling, data, DNS, exfiltration, Pipeline, transforms
Share This Article
Twitter Email Copy Link Print
Previous Article Elevate showcases infrastructure developments at Data Centre World London 2026 Elevate showcases infrastructure developments at Data Centre World London 2026
Next Article Digital brain as scaling intelligent automation without disruption demands a focus on architectural elasticity, not just deploying more bots. Scaling intelligent automation without breaking live workflows
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

PermitFlow Raises $31M in Series A Funding

PermitFlow, a Milpitas, California-based firm that simplifies the development allowing course of, raises $31m in…

February 23, 2024

Cynomi Raises $37M in Series B Funding

Cynomi, a Tel Aviv, Israel-based vCISO platform supplier for managed service suppliers (MSPs) and managed…

April 23, 2025

Getting AI done means getting services right first

Ian Shearer, Managing Director, APAC & EMEA at Park Place Applied sciences, explores why knowledgeable…

December 3, 2025

FileCloud Acquires Signority

FileCloud, an Austin, TX-based firm which makes a speciality of content material governance and collaboration…

May 27, 2024

OPX Live: Launching a Unified Platform for the Creator Economy 2.0

Los Angeles, United States, December twenty seventh, 2024, Chainwire OPX Live is scheduled to launch…

December 27, 2024

You Might Also Like

It’s time to separate fact from fiction on data centre energy demand
Global Market

It’s time to separate fact from fiction on data centre energy demand

By saad
3D Rendering of digital binary data on microchip with glow circuit board background. Concept of for deep machine learning, crypto currency, hi tech product uses. Big data visualization, cpu processing
Global Market

Arm shifts course, moves into silicon business

By saad
LINX completes LON2 network refresh with Nokia
Global Market

LINX completes LON2 network refresh with Nokia

By saad
container orchestration, clusters, clustering, Kubernetes
Global Market

Meshery 1.0 debuts, offering new layer of control for cloud-native infrastructure

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.