DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Trend Micro Research Reveals Thousands Of Exposed AI Servers

DigitalCIO Bureau by DigitalCIO Bureau
July 30, 2025
in Tech News
0
Trend Micro Research Reveals Thousands Of Exposed AI Servers
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Trend Micro has urged AI engineers and IT leaders to heed best practices in developing and deploying secure systems, or risk exposure to data theft, poisoning, ransom, and other attacks.

Rachel Jin, Chief Enterprise Platform Officer at Trend: “AI may represent the opportunity of the century for global businesses. But those rushing in too fast without taking adequate security precautions may end up causing more harm than good. As our report reveals, too much AI infrastructure is already being built from unsecured and/or unpatched components, creating an open door for threat actors.”

Trend’s report highlights several AI-related security challenges:

1)  Vulnerabilities/exploits in critical components

Organizations wishing to develop, deploy and use AI applications must leverage multiple specialized software components and frameworks, which may contain vulnerabilities one may find in regular software. The report reveals zero-day vulnerabilities and exploits in core components including ChromaDB, Redis, NVIDIA Triton, and NVIDIA Container Toolkit.

2)  Accidental exposure to the internet

Vulnerabilities are often the result of rushed development and deployment timelines, as are instances when AI systems are accidentally exposed to the internet, where they can be probed by adversaries. As detailed in the report, Trend has found 200+ ChromaDB servers, 2,000 Redis servers, and 10,000+ Ollama servers exposed to the internet with no authentication.

3)  Vulnerabilities in open-source components

Many AI frameworks and platforms use open-source software libraries to provide common functionality.  However, open-source components often contain vulnerabilities that end up creeping into production systems, where they are hard to detect. At the recent Pwn2Own Berlin, which featured a new AI category, researchers uncovered an exploit for the Redis vector database, which stemmed from an outdated Lua component.

4)  Container-based weaknesses

A great deal of AI infrastructure runs on containers, meaning it is exposed to the same security vulnerabilities and threats that impact cloud and container environments. As outlined in the report, Pwn2Own researchers were able to uncover an exploit for the NVIDIA Container Toolkit. Organizations should sanitize inputs and monitor runtime behavior to mitigate such risks.

Stuart MacLellan, CTO, NHS SLAM: “There are still lots of questions around AI models and how they could and should be used. We now get much more information now than we ever did about the visibility of devices and what applications are being used. It’s interesting to collate that data and get dynamic, risk-based alerts on people and what they’re doing depending on policies and processes. That’s going to really empower the decisions that are made organizationally around certain products.”

Both the developer community and its customers must better balance security with time to market in order to mitigate the risks outlined above. Concrete steps could include:

  • Improved patch management and vulnerability scans
  • Maintaining an inventory of all software components, including third-party libraries and subsystems
  • Container management security best practices, including using minimal base images and runtime security tools
  • Configuration checks to ensure AI infrastructure components, like servers aren’t exposed to the internet
Tags: Trend Micro
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Infosys Partners with Harness to Advance AI-Driven Enterprise Transformation and Modernization

by DigitalCIO Bureau
April 10, 2026
0
Infosys Partners with Harness to Advance AI-Driven Enterprise Transformation and Modernization

Infosys and software delivery platform company Harness have announced a strategic collaboration aimed at helping enterprises accelerate transformation and modernization efforts through artificial intelligence-led capabilities. The partnership brings...

Read moreDetails

TCS renews its strategic partnership with Marks and Spencer

by DigitalCIO Bureau
April 10, 2026
0
TCS renews its strategic partnership with Marks and Spencer

Tata Consultancy Services (TCS) announced the renewal of its major, multi year strategic partnership with Marks & Spencer (M&S). This continuing engagement builds on the more than a...

Read moreDetails

Nokia Recognized by GigaOm as “Leader and Outperformer” in Data Center Switching for Fifth Consecutive Year

by DigitalCIO Bureau
April 8, 2026
0
Nokia Recognized by GigaOm as “Leader and Outperformer” in Data Center Switching for Fifth Consecutive Year

Nokia has been recognized by industry research firm GigaOm as a “Leader and Outperformer” in data center switching for the fifth consecutive year, underscoring the company’s strengthening role...

Read moreDetails

New Study Shows an Adaptive Workforce is a Key Characteristic of Top Performing Organizations

by DigitalCIO Bureau
April 8, 2026
0
New Study Shows an Adaptive Workforce is a Key Characteristic of Top Performing Organizations

New research shows that a connected system of workforce intelligence and talent activation yields 11x greater adaptability and 6x higher productivity, with up to 8x stronger financial performance...

Read moreDetails

Tata Play Fiber Collaborates with IBM to Build Next-Gen AI-Ready Data Infrastructure

by DigitalCIO Bureau
April 6, 2026
0
Tata Play Fiber Collaborates with IBM to Build Next-Gen AI-Ready Data Infrastructure

Tata Play Fiber has announced a strategic collaboration with IBM to build a next‑generation, AI‑ready enterprise data lakehouse powered by IBM watsonx. The new platform will unify 25...

Read moreDetails
Next Post
Check Point Acquires SASE Security Firm Perimeter 81

Palo Alto Networks Acquires CyberArk For $25 Billion

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Veeam Launches Cyber Secure Program to Help Enterprises Protect and Recover from Ransomware Attacks

Veeam Strengthens Data Resilience Through Integration With Splunk

July 25, 2024

Infosys to Open Software Development Centre in West Bengal

August 14, 2018

Microsoft Surface delivered double-digit growth

January 31, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?