

Security Intelligence
IBM
Security Intelligence is a weekly news podcast for cybersecurity pros who need to stay ahead of fast-moving threats. Each week, we cover the latest threats, trend, and stories shaping the digital landscape, alongside expert insights that help make sense of it all. Whether you’re a builder, defender, business leader or simply curious about how to stay secure in a connected world, you’ll find timely updates and timeless principles in an accessible, engaging format.New episodes weekly on Wednesdays at 6am EST.
Episodes
Mentioned books

Nov 19, 2025 • 40min
Anthropic stops AI spies, the new OWASP Top 10 and the rise of small-time ransomware
Anthropic says it disrupted a nearly fully autonomous espionage campaign carried out by AI agents. But some cybersecurity pros are skeptical of the framing.On the latest episode of Security Intelligence, host Matt Kosinski is joined by Ryan Anschutz, Evelyn Anderson, Seth Glasgow and Mixture of Experts podcast fixture Chris Hay to dig into Anthropic’s report and the range of responses to it. Plus: The newest OWASP Top 10 is here, the ransomware landscape is cracking up and does cyber insurance just encourage hackers? All that and more on Security Intelligence.00:00 -- Introduction01:29 -- Anthropic’s AI spy ring bust15:44 -- OWASP Top 10 202524:41 -- Small ransomware gangs33:45 -- Is cyber insurance worth it? The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligenceSubscribe for AI and security updates → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120

Nov 12, 2025 • 42min
AI slop in cybersecurity, OT security fails and lessons from the Louvre heist
Have we lost the plot when it comes to AI malware? This week, host Matt Kosinski and panelists Claire Nunez, Austin Zeizel and Dave Bales discuss the growing trend of cybersecurity pros pushing back on AI malware “research.” Is it all puffery? Genuine threat? Some secret third thing? Plus: How hackers are stealing real-world cargo, time-delayed malware, the Louvre’s weak password and why don't more people patch their OT systems? 00:00 – Introduction 01:15 – The IT-OT gap 11:18 – Digital cargo thieves 20:12 – Time-delayed logic bombs 25:53 – AI malware vs. AI slop 33:47 – The Louvre’s passwordThe opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Learn more about AI malware → https://www.ibm.com/think/insights/defend-against-ai-malware Explore the podcast → https://www.ibm.com/think/podcasts/security-intelligence

Nov 5, 2025 • 42min
Android malware that acts like a person and AI agents that act like malware
What do AI agents, the stock market and behavior-based threat detection tools have in common? You’ll need to listen to this week’s episode of Security Intelligence to find out. Join host Matt Kosinski and panelists Sridhar Muppidi and Cris Thomas for a jam-packed conversation, including new ways to build malicious AI agents, a malware strain that types like a person, a social engineering scheme that manipulates stock prices and a banner year for bug bounties. Plus: When it comes to new tech, why does governance always lag so far behind implementation? All that and more on Security Intelligence. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Read more about the AI governance gap → https://www.ibm.com/think/insights/cios-ai-risk-governance-gap Check out our new special edition episode → https://www.ibm.com/think/podcasts/security-intelligence/social-engineering-expert-talks-physical-securityExplore the podcast → https://www.ibm.com/think/podcasts/security-intelligenceSubscribe for AI and security updates → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52954

Oct 31, 2025 • 13min
How to break into an office: A social engineering expert talks physical security
Could you break into an office armed with nothing more than a coffee-stained resume and some charisma? Meet someone who can. Today’s bonus episode of Security Intelligence features an in-depth interview with Stephanie Carruthers, Global Head of Cyber Range and Chief People Hacker at IBM X-Force. Stephanie shares the harrowing tale of one of her most daring physical security assessments. Along the way, we discuss why physical security and cybersecurity are two sides of the same coin, highlight common physical security gaps and reveal why your office trash is a criminal’s treasure. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence Learn more about physical security in cybersecurity: https://www.ibm.com/think/insights/physical-cybersecurity

Oct 29, 2025 • 44min
Is ChatGPT Atlas safe? Plus: invisible worms, ghost networks and the AWS outage
Guests Dave McGinnis, an expert in threat detection; J.R. Rao, a security architecture specialist; and Suja Viswesan, a VP of security products, discuss the alarming risks associated with AI browsers like ChatGPT Atlas. They explore security measures needed to protect these platforms, including prompt sanitization and observability. The conversation shifts to a ghost network on YouTube, fueled by fake tutorials that distribute malware. Finally, they examine the implications of emerging malware like Glassworm and the importance of resilient cloud architectures.

Oct 22, 2025 • 46min
RIP Windows 10, automated code repair and battling the payroll pirates
Is Windows 10 dead? This week, panelists Michelle Alvarez, Sridhar Muppidi and Jeff Crume join host Bryan Clark to discuss support for Windows 10 coming to an end. We also talk AI use in SOCs, automated code repair and the battle against payroll pirates coming after your next paycheck. 00:00 – Intro 01:10 – RIP Windows 10 08:38 – The future of SOCs 19:41 – AI code repair 31:27 – Plundering payroll pirates The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence Subscribe to the IBM Think newsletter: https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120

13 snips
Oct 1, 2025 • 50min
How to scam an AI agent, DDoS attack trends and busting cybersecurity myths
Join experts Jeff Crume, an IBM Distinguished Engineer focused on AI and data security, Nick Bradley, a hands-on incident response practitioner, and Claire Nuñez, Creative Director for IBM X-Force Cyber Range, as they delve into fascinating topics. Discover alarming new methods to trick AI agents, the resurgence of DDoS attacks targeting tech startups, and the complicated legacy of zero trust security. They also debunk persistent cybersecurity myths and explore the trade-offs of privacy in the digital age, making for an insightful discussion.

Sep 24, 2025 • 43min
The AI vulnerability apocalypse, a new strain of Petya and dumb cybersecurity rules
An AI security CEO thinks we’re six months away from an “AI vulnerability cataclysm.” Is this a legitimate threat, or just fear-mongering? On this week’s episode, host Matt Kosinski and panelists Cris Thomas, Suja Viswesan and Troy Bettencourt debate whether we're headed straight for an AI security disaster. We also react to reports on Scattered Spider’s return (surprise!), a potential new strain of the devastating Petya ransomware and a survey of common cloud misconfigurations. Plus: Hot takes on dumb cybersecurity rules. All this and more, on Security Intelligence. 00:00 – Intro 01:02 – The AI apocalypse 12:53 – Scattered Spider’s back 23:41 – Misconfiguration risks 32:35 – What is HybridPetya? 42:46 – Dumb cybersecurity rules The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Subscribe to the IBM Think newsletter: https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120 Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence Learn more about cybersecurity: https://www.ibm.com/think/security

Sep 17, 2025 • 46min
AI ransomware, hiring fraud and the end of Scattered Lapsus$ Hunters
Has the most notorious cybercrime gang of the moment really hung up its keyboards? In this episode of Security Intelligence, host Matt Kosinski along with panelists Dave Bales, Michelle Alvarez and Sridhar Muppidi discuss Scattered Lapsus$ Hunters’ retirement announcement, the ethics of ransomware research, software supply chain security lessons from the npm hack, the state of OT security, and hiring fraud. Plus: Dave takes on CVSS scores. All this and more, on Security Intelligence. 00:00 – Intro 02:12 – Scattered Lapsus$ Hunters retire 8:05 – AI ransomware is here 15:43 – npm hijacking 24:51 – X-Force on OT threats 35:27 – AI hiring fraud 41:36 – A hacker and Huntress EDR The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Subscribe to the IBM Think newsletter: https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120 Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence Learn more about cybersecurity: https://www.ibm.com/think/security

Sep 10, 2025 • 38min
Vibe hacking, HexStrike AI and the latest scheme from Scattered Lapsus$ Hunters
Have we made cybercrime too easy? In the very first episode of Security Intelligence, panelists Jeff Crume, Suja Viswesan and Nick Bradley join host Matt Kosinski to discuss the invention of vibe hacking and HexStrike AI, an offensive security framework that threat actors are co-opting to command their own AI agent armies. We also discuss Scattered Lapsus$ Hunters’ unconventional new ransom demand and the rise of the RATs, or remote access trojans. Plus: A game of “Would You Rather?" 00:00 – Intro 1:40 – Introducing vibe hacking 9:28 – HexStrike AI fuels AI agent crime 14:42 – AI agent cyber attacks vs. Human cyber attacks 18:16 – Scattered Lapsus$ Hunters want Google to fire employees 26:03 – Remote Access Trojans on the rise The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Subscribe to the IBM Think newsletter: https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120 Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence Learn more about cybersecurity: https://www.ibm.com/think/security


