DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Trend Micro Research Reveals Thousands Of Exposed AI Servers

DigitalCIO Bureau by DigitalCIO Bureau
July 30, 2025
in Tech News
0
Trend Micro Research Reveals Thousands Of Exposed AI Servers
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Trend Micro has urged AI engineers and IT leaders to heed best practices in developing and deploying secure systems, or risk exposure to data theft, poisoning, ransom, and other attacks.

Rachel Jin, Chief Enterprise Platform Officer at Trend: “AI may represent the opportunity of the century for global businesses. But those rushing in too fast without taking adequate security precautions may end up causing more harm than good. As our report reveals, too much AI infrastructure is already being built from unsecured and/or unpatched components, creating an open door for threat actors.”

Trend’s report highlights several AI-related security challenges:

1)  Vulnerabilities/exploits in critical components

Organizations wishing to develop, deploy and use AI applications must leverage multiple specialized software components and frameworks, which may contain vulnerabilities one may find in regular software. The report reveals zero-day vulnerabilities and exploits in core components including ChromaDB, Redis, NVIDIA Triton, and NVIDIA Container Toolkit.

2)  Accidental exposure to the internet

Vulnerabilities are often the result of rushed development and deployment timelines, as are instances when AI systems are accidentally exposed to the internet, where they can be probed by adversaries. As detailed in the report, Trend has found 200+ ChromaDB servers, 2,000 Redis servers, and 10,000+ Ollama servers exposed to the internet with no authentication.

3)  Vulnerabilities in open-source components

Many AI frameworks and platforms use open-source software libraries to provide common functionality.  However, open-source components often contain vulnerabilities that end up creeping into production systems, where they are hard to detect. At the recent Pwn2Own Berlin, which featured a new AI category, researchers uncovered an exploit for the Redis vector database, which stemmed from an outdated Lua component.

4)  Container-based weaknesses

A great deal of AI infrastructure runs on containers, meaning it is exposed to the same security vulnerabilities and threats that impact cloud and container environments. As outlined in the report, Pwn2Own researchers were able to uncover an exploit for the NVIDIA Container Toolkit. Organizations should sanitize inputs and monitor runtime behavior to mitigate such risks.

Stuart MacLellan, CTO, NHS SLAM: “There are still lots of questions around AI models and how they could and should be used. We now get much more information now than we ever did about the visibility of devices and what applications are being used. It’s interesting to collate that data and get dynamic, risk-based alerts on people and what they’re doing depending on policies and processes. That’s going to really empower the decisions that are made organizationally around certain products.”

Both the developer community and its customers must better balance security with time to market in order to mitigate the risks outlined above. Concrete steps could include:

  • Improved patch management and vulnerability scans
  • Maintaining an inventory of all software components, including third-party libraries and subsystems
  • Container management security best practices, including using minimal base images and runtime security tools
  • Configuration checks to ensure AI infrastructure components, like servers aren’t exposed to the internet
Tags: Trend Micro
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Flipkart, Axis Bank and PayU Introduce Biometric Authentication for Card Payments

by DigitalCIO Bureau
April 29, 2026
0
Flipkart, Axis Bank and PayU Introduce Biometric Authentication for Card Payments

Flipkart in collaboration with Axis Bank and PayU, announced the launch of biometric authentication for card payments. Three trusted organizations have joined forces for this initiative, building on...

Read moreDetails

VikingCloud Selected for 2026 Cloud Security Awards Best Security Compliance in Enterprise Category

by DigitalCIO Bureau
April 29, 2026
0
VikingCloud Selected for 2026 Cloud Security Awards Best Security Compliance in Enterprise Category

VikingCloud, a cybersecurity and compliance protection company, announced that its Asgard Platform with Compliance & Risk Services has been shortlisted for the 2026 Cloud Security Awards in the...

Read moreDetails

Gajendra Arya Appointed as Head of Technology at Almonds Ai

by DigitalCIO Bureau
April 28, 2026
0
Gajendra Arya Appointed as Head of Technology at Almonds Ai

Almonds Ai has announced the appointment of Gajendra Arya as its new Head of Technology, marking a strategic move to strengthen the company’s technology leadership and accelerate innovation...

Read moreDetails

TCS and Australian Securities Exchange (ASX) go-live with CHESS Release 1 for cash clearing & settlement

by DigitalCIO Bureau
April 28, 2026
0
TCS and Australian Securities Exchange (ASX) go-live with CHESS Release 1 for cash clearing & settlement

The deployment on TCS BaNCS for Market Infrastructure and Quartz solutions provides the ASX with a modern, high performance, scalable and resilient cloud solution Tata Consultancy Services (TCS)...

Read moreDetails

Srikanth Velamakanni Appointed Chairperson of Nasscom

by DigitalCIO Bureau
April 27, 2026
0
Srikanth Velamakanni Appointed Chairperson of Nasscom

Nasscom has appointed Srikanth Velamakanni, Co-founder and Group Chief Executive, Fractal Analytics Ltd., as its new Chairperson. He succeeds Sindhu Gangadharan, while Kishor Patil has been named vice...

Read moreDetails
Next Post
Check Point Acquires SASE Security Firm Perimeter 81

Palo Alto Networks Acquires CyberArk For $25 Billion

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Accenture Helps Organizations Strengthen Cloud Security with Google Cloud

Accenture Helps Organizations Strengthen Cloud Security with Google Cloud

March 16, 2026

Indian networking market grew 14.8% in Q1, Cisco leads

July 8, 2019
Check Point Acquires SASE Security Firm Perimeter 81

Atlassian Acquires AirTrack

November 2, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?