<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Offense Just Got a Co-Pilot.]]></title><description><![CDATA[<p>Offense Just Got a Co-Pilot.</p><p>The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used <a href="https://infosec.exchange/tags/Claude" rel="tag">#<span>Claude</span></a> and <a href="https://infosec.exchange/tags/ChatGPT" rel="tag">#<span>ChatGPT</span></a> to assist an intrusion into a water utility in Monterrey. The OT <a href="https://infosec.exchange/tags/breach" rel="tag">#<span>breach</span></a> ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.</p><p>This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making <a href="https://infosec.exchange/tags/OT" rel="tag">#<span>OT</span></a> infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.</p><p>→ Week #19/2026 also covers: A 64-day cPanel zero-day window, <a href="https://infosec.exchange/tags/ShinyHunters" rel="tag">#<span>ShinyHunters</span></a> hits an ed-tech giant, and Europe blocks <a href="https://infosec.exchange/tags/Huawei" rel="tag">#<span>Huawei</span></a> from its solar grid.</p><p>Full issue <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f449.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_right" style="height:23px;width:auto;vertical-align:middle" title="👉" alt="👉" /> <a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot" rel="nofollow noopener"><span>https://</span><span>infosec-mashup.santolaria.net/</span><span>p/infosec-mashup-19-2026-offense-just-got-a-co-pilot</span></a></p><p>If you find it useful, subscribe to get it in your inbox every weekend <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4e8.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--incoming_envelope" style="height:23px;width:auto;vertical-align:middle" title="📨" alt="📨" /> <a href="https://infosec.exchange/tags/infosecMASHUP" rel="tag">#<span>infosecMASHUP</span></a> <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threatintel" rel="tag">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/AI" rel="tag">#<span>AI</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/a2fd0250-051d-4d0e-ad32-051ab62d372b/offense-just-got-a-co-pilot.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:25:22 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a2fd0250-051d-4d0e-ad32-051ab62d372b.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 09 May 2026 09:27:08 GMT</pubDate><ttl>60</ttl></channel></rss>