Wednesday, 15 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > AI transforms ‘dangling DNS’ into automated data exfiltration pipeline
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

Last updated: March 6, 2026 4:04 pm
Published March 6, 2026
Share
URL HTTP Web Address
SHARE

The brand new hijacked web page has the right URL and would possibly even have the right content material on it. However there are additionally hidden prompts embedded within the HTML, SVG metadata or different invisible parts—prompts that the AI agent might interpret as professional directions.

Now the attacker might probably have entry to every thing the agent has entry to. In the meantime, brokers are getting smarter. Even when an agent doesn’t have entry to a selected company useful resource that the attacker desires, the agent would possibly be capable to work out learn how to get to it, and the corporate can be paying for the compute time it takes for the agent to determine it out.

“Infrastructure or code that’s left operational however not maintained and monitored is a traditional assault vector for cyber criminals,” says Steve Winterfeld, advisory CISO at Akamai.

As a CISO, he’s frequently battling with this type of cyber debt, he says. “And this challenge is shortly climbing to the highest of the listing to deal with.” Akamai itself has not too long ago added a brand new functionality to its DNS safety suite to fulfill this particular concern, he provides.

How huge a possible downside is that this? Final yr, safety analysis agency Watchtowr found 150 abandoned S3 buckets beforehand utilized in business and open-source software program merchandise, governments, and infrastructure pipelines, registered them, and noticed eight million requests over the subsequent two months for issues like software program updates, pre-compiled binaries, digital machine photos, and JavaScript recordsdata.

See also  CMA concludes UK cloud market investigation

Dangling DNS and subdomain takeovers have been utilized by attackers for over a decade, says Avinash Rajeev, chief of PwC’s cyber, information and tech danger platform. “It’s not a uncommon or extremely technical edge case.”

Source link

TAGGED: automated, dangling, data, DNS, exfiltration, Pipeline, transforms
Share This Article
Twitter Email Copy Link Print
Previous Article Elevate showcases infrastructure developments at Data Centre World London 2026 Elevate showcases infrastructure developments at Data Centre World London 2026
Next Article Digital brain as scaling intelligent automation without disruption demands a focus on architectural elasticity, not just deploying more bots. Scaling intelligent automation without breaking live workflows
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

What is the Way to Keep Cloud Expenses Under Control?

CIO’s senior author Paulo Rooney not too long ago hosted a panel dialogue with esteemed…

July 19, 2024

New Data Center Developments: May 2024  | Data Center Knowledge

The demand for brand new knowledge facilities is not displaying any signal of slowing. With…

May 6, 2024

Global Crypto Exchange ‘IMBX’ Debuts with Next-Generation Trading Platform

Seoul, South Korea, June tenth, 2025, Chainwire IMBX, a brand new world cryptocurrency trade, has…

June 10, 2025

Microsoft’s new rStar-Math technique upgrades small models to outperform OpenAI’s o1-preview at math problems

Be a part of our each day and weekly newsletters for the most recent updates…

January 10, 2025

Google Launches Ironwood TPU For Next-Gen AI Inference

Google has unveiled Ironwood, its seventh-generation AI chip, which the corporate stated is designed to…

April 10, 2025

You Might Also Like

AI ambition means little without the people to run it
Global Market

AI ambition means little without the people to run it

By saad
A human hand against a midnight-black background holds a tablet like a platter with the word
Global Market

Cisco just made two moves to own the AI infrastructure stack

By saad
Mphasis and Flagstar Bank complete data centre and platform modernisation programme
Infrastructure

Mphasis and Flagstar Bank complete data centre and platform modernisation programme

By saad
Sateliot estrecha lazos con Leaf Space.
Global Market

Satellite backhaul service Globalstar has a new, rich owner amid challenging market conditions

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.