#ot — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #ot, aggregated by home.social.
-
📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.
Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.
So what should you do?
👀 Read our latest blog to get the scoop from our experts!
-
📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.
Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.
So what should you do?
👀 Read our latest blog to get the scoop from our experts!
-
📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.
Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.
So what should you do?
👀 Read our latest blog to get the scoop from our experts!
-
📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.
Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.
So what should you do?
👀 Read our latest blog to get the scoop from our experts!
-
📣 New federal guidance recently dropped on applying Zero Trust (ZT) to OT.
Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries.
So what should you do?
👀 Read our latest blog to get the scoop from our experts!
-
https://www.europesays.com/britain/35763/ Glaucoma UK Helpline receives accreditation #Glaucoma #GlaucomaUK #GlaucomaUK’sHelpline #HelplinesPartnership #HelplinesStandards #JoanneCreighton #OptometryToday #OT #ShelleyShocolinskyDwyer #UK #UnitedKingdom
-
RE: https://mastodon.radio/@vk6flab/116568311450964822
Inkscape supports German petition to recognize Open Source volunteers
#petition #opensource #volunteering #inkscape
https://inkscape.org/news/2026/05/13/inkscape-supports-german-petition-to-recognize-ope/
-
RE: https://mastodon.radio/@vk6flab/116568311450964822
Inkscape supports German petition to recognize Open Source volunteers
#petition #opensource #volunteering #inkscape
https://inkscape.org/news/2026/05/13/inkscape-supports-german-petition-to-recognize-ope/
-
RE: https://mastodon.radio/@vk6flab/116568311450964822
Inkscape supports German petition to recognize Open Source volunteers
#petition #opensource #volunteering #inkscape
https://inkscape.org/news/2026/05/13/inkscape-supports-german-petition-to-recognize-ope/
-
RE: https://mastodon.radio/@vk6flab/116568311450964822
Inkscape supports German petition to recognize Open Source volunteers
#petition #opensource #volunteering #inkscape
https://inkscape.org/news/2026/05/13/inkscape-supports-german-petition-to-recognize-ope/
-
RE: https://mastodon.radio/@vk6flab/116568311450964822
Inkscape supports German petition to recognize Open Source volunteers
#petition #opensource #volunteering #inkscape
https://inkscape.org/news/2026/05/13/inkscape-supports-german-petition-to-recognize-ope/
-
Recognition of open-source work as voluntary work
Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.
-
Recognition of open-source work as voluntary work
Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.
-
Recognition of open-source work as voluntary work
Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.
-
Recognition of open-source work as voluntary work
Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.
-
Recognition of open-source work as voluntary work
Call for open-source work to be recognised as voluntary work for the common good – on a par with voluntary work for community organisations, youth work or emergency services.
-
USN F/A-18F 166673 "VANDY 1" of VX-9 "The Vampires" with USAF F-35A 18-5449 and 17-5241 of the 422d TES during Grey Flag, September 2025 #AvGeek #nasptmugu #Mugu #ptmugu #greyflag #photography #usnavy #usnavalaviation #OT #USAF #nasptmugu #Nikon #vandy1 #nikonphotgraphy #VX9 #F35C #cvvhrn
-
USN F/A-18F 166673 "VANDY 1" of VX-9 "The Vampires" with USAF F-35A 18-5449 and 17-5241 of the 422d TES during Grey Flag, September 2025 #AvGeek #nasptmugu #Mugu #ptmugu #greyflag #photography #usnavy #usnavalaviation #OT #USAF #nasptmugu #Nikon #vandy1 #nikonphotgraphy #VX9 #F35C #cvvhrn
-
USN F/A-18F 166673 "VANDY 1" of VX-9 "The Vampires" with USAF F-35A 18-5449 and 17-5241 of the 422d TES during Grey Flag, September 2025 #AvGeek #nasptmugu #Mugu #ptmugu #greyflag #photography #usnavy #usnavalaviation #OT #USAF #nasptmugu #Nikon #vandy1 #nikonphotgraphy #VX9 #F35C #cvvhrn
-
USN F/A-18F 166673 "VANDY 1" of VX-9 "The Vampires" with USAF F-35A 18-5449 and 17-5241 of the 422d TES during Grey Flag, September 2025 #AvGeek #nasptmugu #Mugu #ptmugu #greyflag #photography #usnavy #usnavalaviation #OT #USAF #nasptmugu #Nikon #vandy1 #nikonphotgraphy #VX9 #F35C #cvvhrn
-
USN F/A-18F 166673 "VANDY 1" of VX-9 "The Vampires" with USAF F-35A 18-5449 and 17-5241 of the 422d TES during Grey Flag, September 2025 #AvGeek #nasptmugu #Mugu #ptmugu #greyflag #photography #usnavy #usnavalaviation #OT #USAF #nasptmugu #Nikon #vandy1 #nikonphotgraphy #VX9 #F35C #cvvhrn
-
🚨New Report: 2026 GigaOm Radar for Operational Technology Security
🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏
🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.
👉 Read the report & register for the webinar today at: https://www.runzero.com/gigaom-radar-ot-security
-
🚨New Report: 2026 GigaOm Radar for Operational Technology Security
🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏
🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.
👉 Read the report & register for the webinar today at: https://www.runzero.com/gigaom-radar-ot-security
-
🚨New Report: 2026 GigaOm Radar for Operational Technology Security
🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏
🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.
👉 Read the report & register for the webinar today at: https://www.runzero.com/gigaom-radar-ot-security
-
🚨New Report: 2026 GigaOm Radar for Operational Technology Security
🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏
🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.
👉 Read the report & register for the webinar today at: https://www.runzero.com/gigaom-radar-ot-security
-
🚨New Report: 2026 GigaOm Radar for Operational Technology Security
🎉 We’re thrilled to announce that runZero is positioned as a Challenger & Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏
🎥 Webinar (May 28 at 12 PM ET): Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore to explore new methods for hardening #OT defenses and share insights from the GigaOm Radar for OT Security.
👉 Read the report & register for the webinar today at: https://www.runzero.com/gigaom-radar-ot-security
-
#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource managementCODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227https://certvde.com/en/advisories/vde-2026-042/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json
-
#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource managementCODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227https://certvde.com/en/advisories/vde-2026-042/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json
-
#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource managementCODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227https://certvde.com/en/advisories/vde-2026-042/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json
-
Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.
Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.
Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:
https://www.it-daily.net/shortnews/wie-claude-ai-hacker-ot-ziele #KRITIS
-
Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.
Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.
Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:
https://www.it-daily.net/shortnews/wie-claude-ai-hacker-ot-ziele #KRITIS
-
Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.
Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.
Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:
https://www.it-daily.net/shortnews/wie-claude-ai-hacker-ot-ziele #KRITIS
-
Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.
Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.
Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:
https://www.it-daily.net/shortnews/wie-claude-ai-hacker-ot-ziele #KRITIS
-
Konzertierte #KI-Unterstützung gegen #OT-Infrastruktur: Im Januar 2026 griffen Unbekannte ein kommunales Wasserwerk in Monterrey, Mexiko an und setzten #AI-Modelle als operativen Kern ein.
Anthropics Claude identifizierte dabei eigenständig und ohne Anweisung kritische #SCADA-Systeme als Angriffsziele und entwickelte in wenigen Stunden ein Framework mit 49 Modulen.
Der Angriff scheiterte, zeigt aber: KI macht spezialisiertes OT-Fachwissen zunehmend entbehrlich:
https://www.it-daily.net/shortnews/wie-claude-ai-hacker-ot-ziele #KRITIS
-
Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?
-
Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?
-
Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?
-
Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?
-
Can someone please explain why when I set my Mac to "Only download" updates, none of the updates are downloaded and I have the privilege of watching my system download 10 GB of data?
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Cyberattacks on Poland’s Water Plants: A Blueprint for Hybrid Warfare
Cyberattacks on Poland’s Water Plants: A Blueprint for Hybrid Warfare Pierluigi Paganini May 08, 2026 Poland’s ABW confirmed…
#Poland #Polska #PL #Europe #Europa #EU #Criticalinfrastructure #Hacking #hackingnews #HybridWarfare #informationsecuritynews #ITInformationSecurity #OT #PierluigiPaganini #RUSSIA #SecurityAffairs #SecurityNews #WaterPlants
https://www.europesays.com/poland/5623/