Vulnerabilities & Exploits
Vulnerabilities & Exploits
- April 03, 2026Persistent DNS references to deleted Azure resources create opportunities for attackers to take over trusted endpoints, highlighting a critical risk in cloud infrastructure. TrendAI™ Research discusses six real-world scenarios where attackers could exploit lingering DNS names, allowing them to inherit trust and compromise dependent systems.
- March 30, 2026Agentic AI marks a fundamental shift that enables autonomous action and decision-making across enterprise systems but also introduces new, complex risks. TrendAI™’s Agentic Governance Gateway empowers organizations to understand, control, and trust agentic AI, ensuring safety and confidence in this new frontier.
- March 12, 2026TrendAI™ Research has discovered several new methods that enable attackers to escape Docker Desktop’s WSL2 VM and run arbitrary code on the host. Our analysis highlights how trusted development tooling can create unexpected attack surfaces when internal APIs and configuration mechanisms are left exposed.