Saturday, 7 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > AI transforms ‘dangling DNS’ into automated data exfiltration pipeline
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

Last updated: March 6, 2026 4:04 pm
Published March 6, 2026
Share
URL HTTP Web Address
SHARE

The brand new hijacked web page has the right URL and would possibly even have the right content material on it. However there are additionally hidden prompts embedded within the HTML, SVG metadata or different invisible parts—prompts that the AI agent might interpret as professional directions.

Now the attacker might probably have entry to every thing the agent has entry to. In the meantime, brokers are getting smarter. Even when an agent doesn’t have entry to a selected company useful resource that the attacker desires, the agent would possibly be capable to work out learn how to get to it, and the corporate can be paying for the compute time it takes for the agent to determine it out.

“Infrastructure or code that’s left operational however not maintained and monitored is a traditional assault vector for cyber criminals,” says Steve Winterfeld, advisory CISO at Akamai.

As a CISO, he’s frequently battling with this type of cyber debt, he says. “And this challenge is shortly climbing to the highest of the listing to deal with.” Akamai itself has not too long ago added a brand new functionality to its DNS safety suite to fulfill this particular concern, he provides.

How huge a possible downside is that this? Final yr, safety analysis agency Watchtowr found 150 abandoned S3 buckets beforehand utilized in business and open-source software program merchandise, governments, and infrastructure pipelines, registered them, and noticed eight million requests over the subsequent two months for issues like software program updates, pre-compiled binaries, digital machine photos, and JavaScript recordsdata.

See also  Google picks Kansas City as site of new $1 billion data center

Dangling DNS and subdomain takeovers have been utilized by attackers for over a decade, says Avinash Rajeev, chief of PwC’s cyber, information and tech danger platform. “It’s not a uncommon or extremely technical edge case.”

Source link

TAGGED: automated, dangling, data, DNS, exfiltration, Pipeline, transforms
Share This Article
Twitter Email Copy Link Print
Previous Article Elevate showcases infrastructure developments at Data Centre World London 2026 Elevate showcases infrastructure developments at Data Centre World London 2026
Next Article Digital brain as scaling intelligent automation without disruption demands a focus on architectural elasticity, not just deploying more bots. Scaling intelligent automation without breaking live workflows
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

OpenAI launches ChatGPT Canvas, challenging Claude Artifacts

Be part of our every day and weekly newsletters for the most recent updates and…

October 4, 2024

Alibaba’s new Qwen3-235B-A22B-2507 beats Kimi-2, Claude Opus

Need smarter insights in your inbox? Join our weekly newsletters to get solely what issues…

July 28, 2025

Microsoft Deal Would Reopen Three Mile Island Nuclear Plant To Power AI

Pennsylvania’s dormant Three Mile Island nuclear plant could be introduced again to life to feed…

September 20, 2024

Japan Data Center Construction Market Innovations Investigated By Industry Trends, Share, Size, Growth, Opportunity And Forecast 2024-2032

IMARC Group, a number one market analysis firm, has not too long ago launched a…

February 20, 2024

Cracking the Code on Cybersecurity ROI

Measuring most sorts of return on funding (ROI) is comparatively easy: You evaluate the price…

April 14, 2025

You Might Also Like

Panasonic launches new unit dedicated to liquid cooling
Global Market

Panasonic launches new unit dedicated to liquid cooling

By saad
Elevate showcases infrastructure developments at Data Centre World London 2026
Design

Elevate showcases infrastructure developments at Data Centre World London 2026

By saad
Can data centres scale AI without putting water under pressure?
Global Market

Can data centres scale AI without putting water under pressure?

By saad
Cisco building exterior with sign
Global Market

Cisco issues emergency patches for critical firewall vulnerabilities

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.