DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Trend Micro Research Reveals Thousands Of Exposed AI Servers

DigitalCIO Bureau by DigitalCIO Bureau
July 30, 2025
in Tech News
0
Trend Micro Research Reveals Thousands Of Exposed AI Servers
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Trend Micro has urged AI engineers and IT leaders to heed best practices in developing and deploying secure systems, or risk exposure to data theft, poisoning, ransom, and other attacks.

Rachel Jin, Chief Enterprise Platform Officer at Trend: “AI may represent the opportunity of the century for global businesses. But those rushing in too fast without taking adequate security precautions may end up causing more harm than good. As our report reveals, too much AI infrastructure is already being built from unsecured and/or unpatched components, creating an open door for threat actors.”

Trend’s report highlights several AI-related security challenges:

1)  Vulnerabilities/exploits in critical components

Organizations wishing to develop, deploy and use AI applications must leverage multiple specialized software components and frameworks, which may contain vulnerabilities one may find in regular software. The report reveals zero-day vulnerabilities and exploits in core components including ChromaDB, Redis, NVIDIA Triton, and NVIDIA Container Toolkit.

2)  Accidental exposure to the internet

Vulnerabilities are often the result of rushed development and deployment timelines, as are instances when AI systems are accidentally exposed to the internet, where they can be probed by adversaries. As detailed in the report, Trend has found 200+ ChromaDB servers, 2,000 Redis servers, and 10,000+ Ollama servers exposed to the internet with no authentication.

3)  Vulnerabilities in open-source components

Many AI frameworks and platforms use open-source software libraries to provide common functionality.  However, open-source components often contain vulnerabilities that end up creeping into production systems, where they are hard to detect. At the recent Pwn2Own Berlin, which featured a new AI category, researchers uncovered an exploit for the Redis vector database, which stemmed from an outdated Lua component.

4)  Container-based weaknesses

A great deal of AI infrastructure runs on containers, meaning it is exposed to the same security vulnerabilities and threats that impact cloud and container environments. As outlined in the report, Pwn2Own researchers were able to uncover an exploit for the NVIDIA Container Toolkit. Organizations should sanitize inputs and monitor runtime behavior to mitigate such risks.

Stuart MacLellan, CTO, NHS SLAM: “There are still lots of questions around AI models and how they could and should be used. We now get much more information now than we ever did about the visibility of devices and what applications are being used. It’s interesting to collate that data and get dynamic, risk-based alerts on people and what they’re doing depending on policies and processes. That’s going to really empower the decisions that are made organizationally around certain products.”

Both the developer community and its customers must better balance security with time to market in order to mitigate the risks outlined above. Concrete steps could include:

  • Improved patch management and vulnerability scans
  • Maintaining an inventory of all software components, including third-party libraries and subsystems
  • Container management security best practices, including using minimal base images and runtime security tools
  • Configuration checks to ensure AI infrastructure components, like servers aren’t exposed to the internet
Tags: Trend Micro
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

New Relic Appoints Simon Rizkalla VP of Customer Advocacy for Asia-Pacific and Japan

by DigitalCIO Bureau
October 16, 2025
0
New Relic Appoints Simon Rizkalla VP of Customer Advocacy for Asia-Pacific and Japan

New Relic has announced the appointment of Simon Rizkalla as Vice President of Customer Advocacy for Asia-Pacific and Japan (APJ). Rizkalla brings over 25 years of enterprise SaaS, AI,...

Read moreDetails

F5 Networks Victim of Advanced Cyberattack: BIG-IP Source Code Stolen

by DigitalCIO Bureau
October 16, 2025
0
Mass scanning of Palo Alto Networks, Cisco and Fortinet Login portals

Security firm F5 has announced that it has been the victim of a highly sophisticated cyberattack by suspected threat hackers linked to a nation-state. The attackers managed to...

Read moreDetails

Gartner: AI-optimized cloud infrastructure growing rapidly

by DigitalCIO Bureau
October 15, 2025
0
Infosys: Over $300 billion In Corporate Cloud Commitments Remain Untapped

AI-optimized infrastructure as a service (IaaS) is emerging as the next disruptive growth engine for AI infrastructure. As a result, end-user spending is projected to grow 146% by...

Read moreDetails

OpenAI and Broadcom to Build 10 Gigawatts of AI Infrastructure

by DigitalCIO Bureau
October 15, 2025
0

OpenAI and Broadcom have announced a collaboration for 10 gigawatts of custom AI accelerators. OpenAI will design the accelerators and systems, which will be developed and deployed in...

Read moreDetails

AI Skillsets Critical to Cybersecurity Skills Gap Solution

by DigitalCIO Bureau
October 14, 2025
0
Fortinet Expands Universal SASE Coverage with Two New India-Based Data Centres   

Fortinet has released its 2025 Global Cybersecurity Skills Gap Report, shedding light on the new and persistent challenges organizations face due to the cybersecurity skills gap. The global...

Read moreDetails
Next Post
Check Point Acquires SASE Security Firm Perimeter 81

Palo Alto Networks Acquires CyberArk For $25 Billion

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Why Google Meet is Gaining Global Popularity

August 20, 2023
CRISIL To Acquire Bridge To India Energy

Qualcomm Boosts AI & IoT Capabilities with Edge Impulse Acquisition

March 11, 2025
NTT offers SaaS Subscriptions to its patented XDR Platform

2024 Thales Cloud Security study identifies cloud resources as the biggest targets for cyberattacks in India

July 4, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?