home.social

#ot — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #ot, aggregated by home.social.

  1. 📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.

    Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.

    So what should you do?

    👀 Read our latest blog to get the scoop from our experts! 🪏

    👉 Blog: runzero.com/blog/ot-and-zero-t

    #ot
  2. 📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.

    Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.

    So what should you do?

    👀 Read our latest blog to get the scoop from our experts! 🪏

    👉 Blog: runzero.com/blog/ot-and-zero-t

    #ot
  3. 📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.

    Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.

    So what should you do?

    👀 Read our latest blog to get the scoop from our experts! 🪏

    👉 Blog: runzero.com/blog/ot-and-zero-t

    #ot
  4. 📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.

    Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.

    So what should you do?

    👀 Read our latest blog to get the scoop from our experts! 🪏

    👉 Blog: runzero.com/blog/ot-and-zero-t

    #ot
  5. 📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.

    Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.

    So what should you do?

    👀 Read our latest blog to get the scoop from our experts! 🪏

    👉 Blog: runzero.com/blog/ot-and-zero-t

    #ot
  6. #ot

    Recognition of open-source work as voluntary work

    Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.

    #opensource #volunteering #petition

    ehrenamt-opensource.de/en/

  7. #ot

    Recognition of open-source work as voluntary work

    Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.

    #opensource #volunteering #petition

    ehrenamt-opensource.de/en/

  8. #ot

    Recognition of open-source work as voluntary work

    Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.

    #opensource #volunteering #petition

    ehrenamt-opensource.de/en/

  9. #ot

    Recognition of open-source work as voluntary work

    Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.

    #opensource #volunteering #petition

    ehrenamt-opensource.de/en/

  10. #ot

    Recognition of open-source work as voluntary work

    Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.

    #opensource #volunteering #petition

    ehrenamt-opensource.de/en/

  11. 🚨New Report: 2026 GigaOm Radar for Operational Technology Security

    🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏

    🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.

    👉 Read the report & register for the webinar today at: runzero.com/gigaom-radar-ot-se

    #ot
  12. 🚨New Report: 2026 GigaOm Radar for Operational Technology Security

    🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏

    🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.

    👉 Read the report & register for the webinar today at: runzero.com/gigaom-radar-ot-se

    #ot
  13. 🚨New Report: 2026 GigaOm Radar for Operational Technology Security

    🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏

    🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.

    👉 Read the report & register for the webinar today at: runzero.com/gigaom-radar-ot-se

    #ot
  14. 🚨New Report: 2026 GigaOm Radar for Operational Technology Security

    🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏

    🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.

    👉 Read the report & register for the webinar today at: runzero.com/gigaom-radar-ot-se

    #ot
  15. 🚨New Report: 2026 GigaOm Radar for Operational Technology Security

    🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏

    🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.

    👉 Read the report & register for the webinar today at: runzero.com/gigaom-radar-ot-se

    #ot
  16. #OT #Advisory VDE-2026-042
    CODESYS Modbus TCP Server - Improper resource management

    CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
    #CVE CVE-2026-35227

    certvde.com/en/advisories/vde-

    #CSAF codesys.csaf-tp.certvde.com/.w

  17. #OT #Advisory VDE-2026-042
    CODESYS Modbus TCP Server - Improper resource management

    CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
    #CVE CVE-2026-35227

    certvde.com/en/advisories/vde-

    #CSAF codesys.csaf-tp.certvde.com/.w

  18. #OT #Advisory VDE-2026-042
    CODESYS Modbus TCP Server - Improper resource management

    CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
    #CVE CVE-2026-35227

    certvde.com/en/advisories/vde-

    #CSAF codesys.csaf-tp.certvde.com/.w

  19. Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.

    Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.

    Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:

    it-daily.net/shortnews/wie-cla #KRITIS

  20. Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.

    Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.

    Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:

    it-daily.net/shortnews/wie-cla #KRITIS

  21. Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.

    Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.

    Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:

    it-daily.net/shortnews/wie-cla #KRITIS

  22. Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.

    Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.

    Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:

    it-daily.net/shortnews/wie-cla #KRITIS

  23. Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.

    Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.

    Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:

    it-daily.net/shortnews/wie-cla #KRITIS

  24. #ot

    Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?

    #apple #ux #softearegore

  25. #ot

    Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?

    #apple #ux #softearegore

  26. #ot

    Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?

    #apple #ux #softearegore

  27. #ot

    Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?

    #apple #ux #softearegore

  28. #ot

    Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?

    #apple #ux #softearegore

  29. Offense Just Got a Co-Pilot.

    The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.

    This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.

    → Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.

    Full issue 👉 infosec-mashup.santolaria.net/

    If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI

  30. Offense Just Got a Co-Pilot.

    The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.

    This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.

    → Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.

    Full issue 👉 infosec-mashup.santolaria.net/

    If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI

  31. Offense Just Got a Co-Pilot.

    The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.

    This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.

    → Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.

    Full issue 👉 infosec-mashup.santolaria.net/

    If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI

  32. Offense Just Got a Co-Pilot.

    The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.

    This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.

    → Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.

    Full issue 👉 infosec-mashup.santolaria.net/

    If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI

  33. Offense Just Got a Co-Pilot.

    The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.

    This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.

    → Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.

    Full issue 👉 infosec-mashup.santolaria.net/

    If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI