Security Intelligence

IBM
undefined
Jan 7, 2026 • 41min

A new take on bug bounties, AI red teams and our New Year’s resolutions

Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligenceSay your cloud storage service gets hacked. Say the attackers broke in by exploiting a vulnerability in an open-source library your organization used to build the service. Who owns that vulnerability?  Microsoft is trying to clear some of the smog obscuring the software supply chain by expanding its bug bounty program to include some third-party code that affects it services. In this episode of Security Intelligence, panelists Jeff Crume, Nick Bradley and Claire Nuñez discuss what that move means for cybersecurity responsibility models going forward.  We also analyze how a three-year-old LastPass breach is still giving cybercriminals new credentials to steal. Turns out “harvest now, decrypt later” isn’t just a quantum concern. Plus: OpenAI fights prompt injections with an automated, AI-powered red team, hackers have a new tool to make ClickFix attacks even easier and we share the New Year’s Resolutions we hope organizations will make in 2026. All that and more on Security Intelligence. 00:00 -- Introduction 1:11 -- Cybersecurity resolutions 6:51 -- Microsoft’s new bug bounties 14:00 -- The LastPass breach’s long tail 26:07 -- Automated red teaming 33:22 -- ClickFix-as-a-service The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Subscribe for AI and security updates → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120
undefined
Dec 29, 2025 • 23min

Why it costs so much to get hacked in America

Why does it cost so much more to get hacked in the United States than anywhere else in the world? In this special bonus episode of Security Intelligence, we sit down with Michelle Alvarez, Manager of Strategic Threat Analysis at IBM X-Force, for a deep dive into IBM’s 2025 Cost of a Data Breach report—and one of its most surprising findings: global breach costs are falling, but US breach costs just hit a record high. What’s driving the gap? In this episode, we unpack: Why faster detection and containment are lowering breach costs globally Why shadow AI is quietly increasing breach risk and driving up response costs Why regulatory fines, global operations and organizational scale hit US companies especially hard And how supply chain breaches, cloud complexity and shadow IT amplify the damage We also explore a critical inflection point ahead: AI isn’t a major attack target yet—but once adoption crosses key market concentration thresholds, attackers will follow the ROI. All that and more on Security Intelligence The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.  Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence Read the Cost of a Data Breach report: https://ibm.biz/BdbkLt
undefined
Dec 23, 2025 • 57min

Cybersecurity’s year in review: ClickFix attacks, vibecoding vulnerabilities, shadow agents and more

Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligence In this special year-end episode of Security Intelligence, we reflect on 2025, a year of new attack methods (ClickFix), new vulnerabilities (vibecoding) and new worries on the horizon (shadow agents). From hijacked AI agents to massive supply chain breaches, 2025 forced security leaders to confront a sobering reality: trust might just be our biggest attack surface.  Join hosts Matt Kosinski and Patrick Austin for a jam-packed look back at the biggest cybersecurity trends and cyberattacks of 2025, the lessons we can learn from them and what the road ahead looks like. Featuring: 00:00 – Introduction4:10 – AI and data security with Michelle Alvarez and Jeff Crume 22:42 – Biggest cyberattacks of 2025 with Dave Bales and Nick Bradley 38:18 – Major lessons, innovations and failures of cybersecurity in 2025 with Suja Viswesan and Sridhar Muppidi All that and more on Security Intelligence. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.  Learn more about cybersecurity → https://www.ibm.com/think/security 
undefined
Dec 17, 2025 • 52min

AI browser bans and the top software flaws of 2025

AI browsers are neat—but are they more trouble than they’re worth?  In this episode of Security Intelligence, Austin Zeizel, Evelyn Anderson and Ryan Anschutz discuss Gartner’s recent advisory warning organizations to ban AI browsers from the workplace for the time being. Is there anything we can do to make them safe enough to use? And that leads to a broader conversation about the relationship between AI model providers and the cybersecurity community. In the wake of some high-profile attacks using AI models—like the spy ring Anthropic busted—cybersecurity pros are split on whether AI vendors are pulling their weight in threat intel circles. This one has it all: spam bombing, social engineering and malicious virtual machines. All that and more on Security Intelligence.  00:00 – Introduction 01:14 -- Gartner: No AI browsers at work 13:38 -- Should AI vendors share threat intel? 23:11 -- MITRE’s top 25 most dangerous software flaws 33:15 -- Are social logins safe? 41:54 -- Bring-your-own-VM attacks The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Learn more about cybersecurity → https://www.ibm.com/think/security 
undefined
Dec 10, 2025 • 50min

React2Shell makes waves, WormGPT falls flat and the latest threat to your Gmail account

Just how big a deal is React2Shell? Depending on who you ask, it’s either a Log4Shell-level event or just another average, everyday application security vulnerability. Patch and move on. This week, on Security Intelligence, panelists Sridhar Muppidi, Claire Nuñez and Ian Molloy weigh in on the contentious debate React2Shell has sparked. However it shakes out, one thing is for sure: The response to this vulnerability has been anything but typical. We also dive into: 13:01 -- Whether malicious LLMs like WormGPT live up to the hype 23:40 -- How hackers can lock you out of your Gmail account by changing your age 34:09 -- What happens when two different threat actors attack you at the same time 42:37 -- Why cybersecurity pros should care about solar radiation grounding 6,000 flights All that and more on Security Intelligence.  The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.  Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligence Subscribe for AI and security updates → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120 
undefined
Dec 3, 2025 • 43min

Your house might be a botnet, your devs are leaking secrets and poems are breaking your AI guardrails

undefined
Nov 28, 2025 • 14min

Trawling the honeypot: What it’s like to discover a new malware strain

Being a malware reverse engineer isn’t always glamorous work. You spend a lot of time digging through junk emails.   But when you find something in there—well, that’s a whole different story.   On this episode of Security Intelligence, X-Force Malware Reverse Engineer Raymond Joseph Alfonso tells us about the time he discovered a curious new malware loader in the honeypot. And that leads to a bigger conversation about how hackers hide malicious code from view—and some of the new techniques they’re cooking up to stay hidden.  The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.  Learn more about QuirkyLoader → https://www.ibm.com/think/x-force/ibm-x-force-threat-analysis-quirkyloader   Follow the Security Intelligence podcast on your preferred platform → https://www.ibm.com/think/podcasts/security-intelligence 
undefined
Nov 26, 2025 • 40min

The dark web job market thrives, AI fraud rings rise and it’s holiday scam season.

Join Nick Bradley, a threat analysis expert, Suja Viswesan, a VP of security products, and Dave McGinnis, a global partner in cyber threat management, as they delve into the thriving dark web job market and the skyrocketing AI fraud schemes that accompany the holiday shopping season. They share practical tips for safer online shopping and dissect an intriguing case of insider threat involving wind turbines. The conversation highlights how AI is reshaping both scams and the job landscape in cybersecurity.
undefined
Nov 19, 2025 • 40min

Anthropic stops AI spies, the new OWASP Top 10 and the rise of small-time ransomware

Anthropic says it disrupted a nearly fully autonomous espionage campaign carried out by AI agents. But some cybersecurity pros are skeptical of the framing.On the latest episode of Security Intelligence, host Matt Kosinski is joined by Ryan Anschutz, Evelyn Anderson, Seth Glasgow and Mixture of Experts podcast fixture Chris Hay to dig into Anthropic’s report and the range of responses to it. Plus: The newest OWASP Top 10 is here, the ransomware landscape is cracking up and does cyber insurance just encourage hackers? All that and more on Security Intelligence.00:00 -- Introduction01:29 -- Anthropic’s AI spy ring bust15:44 -- OWASP Top 10 202524:41 -- Small ransomware gangs33:45 -- Is cyber insurance worth it? The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligenceSubscribe for AI and security updates → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120
undefined
Nov 12, 2025 • 42min

AI slop in cybersecurity, OT security fails and lessons from the Louvre heist

Have we lost the plot when it comes to AI malware?  This week, host Matt Kosinski and panelists Claire Nunez, Austin Zeizel and Dave Bales discuss the growing trend of cybersecurity pros pushing back on AI malware “research.” Is it all puffery? Genuine threat? Some secret third thing?  Plus: How hackers are stealing real-world cargo, time-delayed malware, the Louvre’s weak password and why don't more people patch their OT systems?   00:00 – Introduction 01:15 – The IT-OT gap 11:18 – Digital cargo thieves 20:12 – Time-delayed logic bombs 25:53 – AI malware vs. AI slop 33:47 – The Louvre’s passwordThe opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.   Learn more about AI malware → https://www.ibm.com/think/insights/defend-against-ai-malware Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligence  

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app