Thursday, 16 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > AI transforms ‘dangling DNS’ into automated data exfiltration pipeline
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

Last updated: March 6, 2026 4:04 pm
Published March 6, 2026
Share
URL HTTP Web Address
SHARE

The brand new hijacked web page has the right URL and would possibly even have the right content material on it. However there are additionally hidden prompts embedded within the HTML, SVG metadata or different invisible parts—prompts that the AI agent might interpret as professional directions.

Now the attacker might probably have entry to every thing the agent has entry to. In the meantime, brokers are getting smarter. Even when an agent doesn’t have entry to a selected company useful resource that the attacker desires, the agent would possibly be capable to work out learn how to get to it, and the corporate can be paying for the compute time it takes for the agent to determine it out.

“Infrastructure or code that’s left operational however not maintained and monitored is a traditional assault vector for cyber criminals,” says Steve Winterfeld, advisory CISO at Akamai.

As a CISO, he’s frequently battling with this type of cyber debt, he says. “And this challenge is shortly climbing to the highest of the listing to deal with.” Akamai itself has not too long ago added a brand new functionality to its DNS safety suite to fulfill this particular concern, he provides.

How huge a possible downside is that this? Final yr, safety analysis agency Watchtowr found 150 abandoned S3 buckets beforehand utilized in business and open-source software program merchandise, governments, and infrastructure pipelines, registered them, and noticed eight million requests over the subsequent two months for issues like software program updates, pre-compiled binaries, digital machine photos, and JavaScript recordsdata.

See also  Tritax Buys 74-Acre UK Site to Build a Massive Data Center

Dangling DNS and subdomain takeovers have been utilized by attackers for over a decade, says Avinash Rajeev, chief of PwC’s cyber, information and tech danger platform. “It’s not a uncommon or extremely technical edge case.”

Source link

TAGGED: automated, dangling, data, DNS, exfiltration, Pipeline, transforms
Share This Article
Twitter Email Copy Link Print
Previous Article Elevate showcases infrastructure developments at Data Centre World London 2026 Elevate showcases infrastructure developments at Data Centre World London 2026
Next Article Digital brain as scaling intelligent automation without disruption demands a focus on architectural elasticity, not just deploying more bots. Scaling intelligent automation without breaking live workflows
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

US approves Nvidia H200 exports to China, raising questions about enterprise GPU supply

Shifting demand eventualities What stays unclear is how a lot demand Chinese language corporations will…

December 10, 2025

CoreSite Study: C-suite Confident, But Caution in IT and Data Strategies

Regardless of a powerful sense of financial optimism amongst C-suite executives, the present VUCA (unstable,…

July 17, 2024

The risks behind the generative AI craze: Why caution is growing

Within the close to future, Silicon Valley may look again at current occasions as the…

October 9, 2024

Red Hat Unveils ‘Policy as Code’ Feature for Hybrid Clouds

Open-source options supplier Purple Hat has launched an replace for its Ansible Automation Platform. In an effort…

May 8, 2024

Snowflake says there’s no evidence attackers breached its platform to hack Ticketmaster

We've got not recognized proof suggesting this exercise was brought on by a vulnerability, misconfiguration,…

June 4, 2024

You Might Also Like

AI services
Global Market

Maine to put brakes on big data centers as AI expansion collides with power limits

By saad
OpenAI
Global Market

OpenAI pulls out of a second Stargate data center deal

By saad
AI ambition means little without the people to run it
Global Market

AI ambition means little without the people to run it

By saad
A human hand against a midnight-black background holds a tablet like a platter with the word
Global Market

Cisco just made two moves to own the AI infrastructure stack

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.