Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»WiFi / Internet & Networking»AI will likely shut down critical infrastructure on its own, no attackers required
    WiFi / Internet & Networking

    AI will likely shut down critical infrastructure on its own, no attackers required

    adminBy adminFebruary 14, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    AI-driven technology powers automation and big data workflows, enabling analysis through neural networks and data analytics for business intelligence, predictive insights, and process optimization.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Thus, he said, companies should set up a business risk program with a governing body that defines and manages those risks, monitoring AI for behavior changes.

    Reframe how AI is managed

    Sanchit Vir Gogia, chief analyst at Greyhound Research, said addressing this problem requires executives to first reframe the structural questions. 

    “Most enterprises still talk about AI inside operational environments as if it were an analytics layer, something clever sitting on top of infrastructure. That framing is already outdated,” he said. “The moment an AI system influences a physical process, even indirectly, it stops being an analytics tool, it becomes part of the control system. And once it becomes part of the control system, it inherits the responsibilities of safety engineering.”

    He noted that the consequences of misconfiguration in cyber physical environments differ from those in traditional IT estates, where outages or instability may result.

    “In cyber physical environments, misconfiguration interacts with physics. A badly tuned threshold in a predictive model, a configuration tweak that alters sensitivity to anomaly detection, a smoothing algorithm that unintentionally filters weak signals, or a quiet shift in telemetry scaling can all change how the system behaves,” he said. “Not catastrophically at first. Subtly. And in tightly coupled infrastructure, subtle is often how cascade begins.”

    He added: “Organizations should require explicit articulation of worst-case behavioral scenarios for every AI-enabled operational component. If demand signals are misinterpreted, what happens? If telemetry shifts gradually, how does sensitivity change? If thresholds are misaligned, what boundary condition prevents runaway behavior? When teams cannot answer these questions clearly, governance maturity is incomplete.”

    attackers Critical infrastructure required shut
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleBrutus: Open-source credential testing tool for offensive security
    Next Article A Sauna Isn’t a Substitute for Exercise
    admin
    • Website

    Related Posts

    No-JavaScript fallbacks in 2026: Less critical, still necessary

    April 18, 2026

    Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

    April 18, 2026

    Critical flaw in Protobuf library enables JavaScript code execution

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    This $10 accessory has completely transformed my Pixel 10

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    If X Isn’t Working, It’s Not Just You

    April 19, 2026

    Recently leaked Windows zero-days now exploited in attacks

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,398)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (849)
    • Tech Tools & Mobile / Apps (1,672)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    This $10 accessory has completely transformed my Pixel 10

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    If X Isn’t Working, It’s Not Just You

    April 19, 2026
    Most Popular
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    • If X Isn’t Working, It’s Not Just You
    • Recently leaked Windows zero-days now exploited in attacks
    • 5 classic series that are guaranteed to turn you into an anime fan
    • I didn’t expect these earbuds to win me over with such a rare feature
    • The Roku App (Official) 13.7.0.8240800 APK Download by Roku, Inc. & its affiliates
    • Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.