{"id":1238,"date":"2026-03-02T09:49:27","date_gmt":"2026-03-02T08:49:27","guid":{"rendered":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/"},"modified":"2026-03-25T15:28:41","modified_gmt":"2026-03-25T14:28:41","slug":"about-offensive-ai-part-ii","status":"publish","type":"post","link":"https:\/\/blog.kybervandals.com\/about-offensive-ai-pa\/","title":{"rendered":"About Offensive AI, Part II"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2026\/02\/photo-1471724603960-98bc193c621d.jpeg\" alt=\"About Offensive AI, Part II\" \/><\/p>\n\n<p>Oh Boy, Oh Boy, what crazy times we live in.<\/p>\n<p>12 Months ago the fuzz was all about MCP, then we saw the rise of agentic AI and skills in a short timeframe, and now its all about agentic swarms, OpenClaw, personal agents etc.<\/p>\n<p> In June 2025 we published our first article &#8222;<a href=\"https:\/\/blog.kybervandals.com\/no-more-secrets-the-use-of-offensive-ai\/\" rel=\"noreferrer\">No More Secrets: The Use of Offensive AI<\/a>&#8220; which took a snapshot of what was the state of AI\/LLM in offensive security at that time, and our conclusion was: <\/p>\n<div class=\"kg-card kg-callout-card kg-callout-card-blue\">\n<div class=\"kg-callout-text\"><b><strong>AI makes the good ones faster, attacks cheaper and the impact more precise. Also, AI is currently implemented into attack-tools, which means no attackvectors will remain hidden, leading to an sharp increase of successrates.<\/strong><\/b><\/div>\n<\/div>\n<p>At that moment, AI was supporting different stages of an attack without the ability to go beyond script kiddy level and execute complex tasks like recon, choosing the right attack paths, adjusting playloads, beeing stealthy as possible etc. <\/p>\n<p>Now, just 9 months later, the landscape has changed drastically, with no end in sight. <\/p>\n<p>Let me give some examples from just 2026 alone that shows the path AI in offensive security heads to:<\/p>\n<p><!--kg-card-begin: html--><br \/>\n<!-- \n\nhttps:\/\/v6.zero.bs\/holmgang\/606\n\n--><br \/>\n<!--kg-card-end: html--><\/p>\n<h3>PentAGI, an autonomous RedTeaming Agent<\/h3>\n<ul>\n<li>Github: <a href=\"https:\/\/github.com\/vxcontrol\/pentagi?ref=blog.kybervandals.com\">https:\/\/github.com\/vxcontrol\/pentagi<\/a><\/li>\n<\/ul>\n<figure class=\"kg-card kg-embed-card\">\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">the cybersecurity industry is about to get completely disrupted.. \ud83d\udc80<\/p>\n<p>someone just open-sourced a fully autonomous AI Red Team.<\/p>\n<p>it\u2019s called PentAGI. multiple AI agents that talk to each other to hack a target. zero human input.<a href=\"https:\/\/t.co\/NQdyTs1LGw?ref=blog.kybervandals.com\">pic.twitter.com\/NQdyTs1LGw<\/a><\/p>\n<p>\u2014 Oliver Prompts (@oliviscusAI) <a href=\"https:\/\/twitter.com\/oliviscusAI\/status\/2024504023999795499?ref_src=twsrc%5Etfw&amp;ref=blog.kybervandals.com\">February 19, 2026<\/a><\/p><\/blockquote>\n<\/figure>\n<h3>Anthropic disrupts AI espionage<\/h3>\n\n<blockquote><p>In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign. The attackers used AI\u2019s \u201cagentic\u201d capabilities to an unprecedented degree\u2014using AI not just as an advisor, but to execute the cyberattacks themselves.<\/p><\/blockquote>\n<ul>\n<li>Article: <a href=\"https:\/\/www.anthropic.com\/news\/disrupting-AI-espionage?ref=blog.kybervandals.com\">https:\/\/www.anthropic.com\/news\/disrupting-AI-espionage<\/a><\/li>\n<\/ul>\n<h3>0-Day-Flood by AI expected<\/h3>\n\n<blockquote><p>AI models can now find high-severity vulnerabilities at scale. Our view is this is a moment to move quickly\u2014to empower defenders and secure as much code as possible while the window exists.<\/p><\/blockquote>\n<ul>\n<li>Article: <a href=\"https:\/\/red.anthropic.com\/2026\/zero-days\/?ref=blog.kybervandals.com\">https:\/\/red.anthropic.com\/2026\/zero-days\/<\/a><\/li>\n<\/ul>\n<h3>AWS: AI-augmented threat actor accesses FortiGate devices at scale<\/h3>\n\n<blockquote><p>Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale. A recent investigation illustrates this shift: Amazon Threat Intelligence observed a Russian-speaking financially motivated threat actor leveraging multiple commercial generative AI services to compromise over 600 FortiGate devices<\/p><\/blockquote>\n<ul>\n<li>Article: <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/?ref=blog.kybervandals.com\">https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/<\/a><\/li>\n<\/ul>\n<p>That is just a small selection, but the trend is clearly visible: <\/p>\n\n<p><strong>You will get attacked soon by a swarm of red teaming agents, in the beginning on beginners level, but the systems will learn fast, and reach senior level within a couple of months.<\/strong><\/p>\n<div class=\"kg-card kg-header-card kg-v2 kg-width-regular kg-style-accent\" data-background-color=\"accent\">\n<div class=\"kg-header-card-content\">\n<div class=\"kg-header-card-text kg-align-center\">\n<h2 class=\"kg-header-card-heading\" data-text-color=\"#FFFFFF\"><b><strong>It&#8217;s High Time to get your external attack surface under control<\/strong><\/b><\/h2>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Oh Boy, Oh Boy, what crazy times we live in. 12 Months ago the fuzz was all about MCP, then we saw the rise of agentic AI and skills in a short timeframe, and now its all about agentic swarms, OpenClaw, personal agents etc. In June 2025 we published our first article &#8222;No More Secrets: [&hellip;]<\/p>","protected":false},"author":2,"featured_media":1239,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"https:\/\/blog.kybervandals.com\/about-offensive-ai-pa\/","_links_to_target":"_blank"},"categories":[1],"tags":[],"class_list":["post-1238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>About Offensive AI, Part II - avydos.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/avydos.com\/en\/about-offensive-ai-part-ii\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Offensive AI, Part II - avydos.com\" \/>\n<meta property=\"og:description\" content=\"Oh Boy, Oh Boy, what crazy times we live in. 12 Months ago the fuzz was all about MCP, then we saw the rise of agentic AI and skills in a short timeframe, and now its all about agentic swarms, OpenClaw, personal agents etc. In June 2025 we published our first article &#8222;No More Secrets: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/avydos.com\/en\/about-offensive-ai-part-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"avydos.com\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-02T08:49:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T14:28:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1998\" \/>\n\t<meta property=\"og:image:height\" content=\"710\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Monja Janneck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monja Janneck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/\"},\"author\":{\"name\":\"Monja Janneck\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393\"},\"headline\":\"About Offensive AI, Part II\",\"datePublished\":\"2026-03-02T08:49:27+00:00\",\"dateModified\":\"2026-03-25T14:28:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/\"},\"wordCount\":456,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/avydos.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg\",\"articleSection\":[\"Allgemein\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/\",\"url\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/\",\"name\":\"About Offensive AI, Part II - avydos.com\",\"isPartOf\":{\"@id\":\"https:\/\/avydos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg\",\"datePublished\":\"2026-03-02T08:49:27+00:00\",\"dateModified\":\"2026-03-25T14:28:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage\",\"url\":\"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg\",\"contentUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg\",\"width\":1998,\"height\":710},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/avydos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Offensive AI, Part II\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/avydos.com\/#website\",\"url\":\"https:\/\/avydos.com\/\",\"name\":\"avydos.com\",\"description\":\"Avydos ist ein DDoS-Stresstest-Selftesting-Service f\u00fcr Security Engineers: DDoS-Bedrohungssimulationen selbstst\u00e4ndig testen unter realen Angriffs-Bedingungen.\",\"publisher\":{\"@id\":\"https:\/\/avydos.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/avydos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/avydos.com\/#organization\",\"name\":\"Avydos by zeroBS GmbH\",\"alternateName\":\"Avydos by zeroBS GmbH\",\"url\":\"https:\/\/avydos.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png\",\"contentUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png\",\"width\":256,\"height\":256,\"caption\":\"Avydos by zeroBS GmbH\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393\",\"name\":\"Monja Janneck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g\",\"caption\":\"Monja Janneck\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About Offensive AI, Part II - avydos.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/avydos.com\/en\/about-offensive-ai-part-ii\/","og_locale":"en_GB","og_type":"article","og_title":"About Offensive AI, Part II - avydos.com","og_description":"Oh Boy, Oh Boy, what crazy times we live in. 12 Months ago the fuzz was all about MCP, then we saw the rise of agentic AI and skills in a short timeframe, and now its all about agentic swarms, OpenClaw, personal agents etc. In June 2025 we published our first article &#8222;No More Secrets: [&hellip;]","og_url":"https:\/\/avydos.com\/en\/about-offensive-ai-part-ii\/","og_site_name":"avydos.com","article_published_time":"2026-03-02T08:49:27+00:00","article_modified_time":"2026-03-25T14:28:41+00:00","og_image":[{"width":1998,"height":710,"url":"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg","type":"image\/jpeg"}],"author":"Monja Janneck","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Monja Janneck","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#article","isPartOf":{"@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/"},"author":{"name":"Monja Janneck","@id":"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393"},"headline":"About Offensive AI, Part II","datePublished":"2026-03-02T08:49:27+00:00","dateModified":"2026-03-25T14:28:41+00:00","mainEntityOfPage":{"@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/"},"wordCount":456,"commentCount":0,"publisher":{"@id":"https:\/\/avydos.com\/#organization"},"image":{"@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg","articleSection":["Allgemein"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/avydos.com\/about-offensive-ai-part-ii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/","url":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/","name":"About Offensive AI, Part II - avydos.com","isPartOf":{"@id":"https:\/\/avydos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage"},"image":{"@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg","datePublished":"2026-03-02T08:49:27+00:00","dateModified":"2026-03-25T14:28:41+00:00","breadcrumb":{"@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/avydos.com\/about-offensive-ai-part-ii\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#primaryimage","url":"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg","contentUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2026\/03\/photo-1471724603960-98bc193c621d-xIKddz.jpg","width":1998,"height":710},{"@type":"BreadcrumbList","@id":"https:\/\/avydos.com\/about-offensive-ai-part-ii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/avydos.com\/"},{"@type":"ListItem","position":2,"name":"About Offensive AI, Part II"}]},{"@type":"WebSite","@id":"https:\/\/avydos.com\/#website","url":"https:\/\/avydos.com\/","name":"avydos.com","description":"Avydos is a DDoS stress test self-testing service for security engineers: test DDoS threat simulations independently under real attack conditions.","publisher":{"@id":"https:\/\/avydos.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/avydos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/avydos.com\/#organization","name":"Avydos by zeroBS GmbH","alternateName":"Avydos by zeroBS GmbH","url":"https:\/\/avydos.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/#\/schema\/logo\/image\/","url":"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png","contentUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png","width":256,"height":256,"caption":"Avydos by zeroBS GmbH"},"image":{"@id":"https:\/\/avydos.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393","name":"Monja Janneck","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g","caption":"Monja Janneck"}}]}},"_links":{"self":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/comments?post=1238"}],"version-history":[{"count":1,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1238\/revisions"}],"predecessor-version":[{"id":1489,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1238\/revisions\/1489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/media\/1239"}],"wp:attachment":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/media?parent=1238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/categories?post=1238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/tags?post=1238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}