2026 Threat Intelligence Index: Ransomware, AI, & Emerging TTP Risks
2026 Threat Intelligence Index: Ransomware, AI, & Emerging TTP Risks
Ready to become a certified SOC Analyst - QRadar SIEM V7.5 Plus CompTIA Cybersecurity Analyst? Register now and use code IBMTechYT20 for 20% off of your exam → https://ibm.biz/BdpsrS
Learn more about the 2026 X-Force Threat Intelligence Index here → https://ibm.biz/BdpsiA
56% of systems are exposed! 🚨 Jeff Crume unpacks exclusive findings from the 2026 X-Force Threat Intelligence Index, revealing how ransomware, AI-driven exploits, and advanced TTPs are evolving. Discover actionable strategies to secure against supply chain attacks, RCE, and advanced cyber threats!
Read the Cost of a Data Breach report → https://ibm.biz/BdpsiJ
#cybersecurity #cyberattack #ransomware
Exploits of public-facing apps are surging. Why?
Explore the Threat Intelligence Index 2026 → https://ibm.biz/Bdpi6d
For years, stolen credentials were king—the hacker’s attack vector of choice. Until now.
The 2026 IBM X-Force Threat Intelligence Index reveals a surge in the exploitation of public-facing applications, overtaking identity-based attacks as the top initial access vector.
Why are threat actors changing their tactics so dramatically—and what does it mean for defenders?
In this episode of Security Intelligence, panelists Claire Nuñez, Chris Caridi and Joe Xatruch break down the biggest findings from the latest Threat Intelligence Index, plus:
"-Infostealers that grab AI agents’ “souls”
"-Compromised packages that drop AI agents as malware"
"-The AI infrastructure flaws we can’t seem to fix"
"-Why threat intelligence is so siloed—and what we can do about it"
All that and more—on Security Intelligence.
00:00 - Introduction
1:17 - Threat Intelligence Index 2026
16:22 - Stealing AI agents’ souls
28:03 - AI infrastructure flaws
36:36 - Threat intelligence made human
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Follow the Security Intelligence podcast on your preferred platform → https://ibm.biz/Bdpi6x
#ThreatIntelligence #AIagentmalware #infostealers
Synthetic Data Generation for Smarter AI Workflows
Ready to become a certified watsonx Data Scientist? Register now and use code IBMTechYT20 for 20% off of your exam → https://ibm.biz/BdbWA4
Learn more about Synthetic Data Generation here → https://ibm.biz/BdbWAr
Struggling to optimize AI workflows? 🤖 Legare Kerrison reveals how Synthetic Data Generation transforms unstructured data into structured insights for smarter training. Discover how tools like SDGHub ensure privacy-preserving, scalable pipelines for AI models and chatbot development. 🚀
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdpBwU
#syntheticdata #chatbotdevelopment #dataquality
What Is NeuroSymbolic AI? Bridging Reasoning & Neural Networks
Ready to become a certified watsonx AI Assistant Engineer? Register now and use code IBMTechYT20 for 20% off of your exam → https://ibm.biz/BdpBYC
Learn more about NeuroSymbolic AI here → https://ibm.biz/BdpBYQ
Can AI move from recognizing to reasoning? 🤔 Prachi Modi explores how Neurosymbolic AI combines neural networks and symbolic reasoning for smarter, explainable systems. Learn how it advances meta-learning and transforms fields like science and law. 🚀
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdpBY3
#aireasoning #explainableai #neuralnetworks
Understanding AI Agent Security: Safeguard LLM Systems Effectively
Ready to become a certified watsonx Generative AI Engineer? Register now and use code IBMTechYT20 for 20% off of your exam → https://ibm.biz/BdpxYc
Learn more about AI Agent Security here → https://ibm.biz/BdpBTq
Are LLM-powered AI agents secure enough? 🚦 Jeff Crume dives into how to govern and protect AI systems with policies, credential management, and enforcement tools. Learn how to manage non-human identities, detect drift, and build reliable, safe AI systems. 🔒
Read the Cost of a Data Breach report → https://ibm.biz/BdpBTP
#aiagents #llm #secureai #aigovernance
India's USD $200B AI hub & Claude builds C compiler
Visit Mixture of Experts podcast page to get more AI content → https://ibm.biz/BdpsYq
Do AI agents still need humans? This week on Mixture of Experts, guest host Matt Kosinski from Security Intelligence is joined by Mihai Criveti, Martin Keen and Kush Varshney. First, we unpack Google and DeepMind's massive USD $200B AI infrastructure investment in India— “The Biggest AI Infrastructure Deal in History.” Is this about sovereignty, geography, or something else entirely? Next, Anthropic researcher Nicholas Carlini used Claude to build a fully operational 100,000-line C compiler autonomously. Our experts debate whether this is impressive or inevitable, and what it means for human developers. Then, a sobering reality check: 36% of AI agent skills contain security vulnerabilities. Finally, as IT leaders question AI ROI, we discuss the shift from "how" to "how much" and whether value-based pricing could change everything. All that and more on this week’s Mixture of Experts.
00:00 – Introduction
1:22 – Google's $200B AI infrastructure deal in India
7:54– Claude builds a C compiler autonomously
26:25 – Security vulnerabilities in AI agent skills
39:44– The AI ROI problem: Measuring value vs. cost
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Learn more about AI agent vulnerabilities → https://ibm.biz/BdpsYf
Subscribe for AI updates → https://ibm.biz/BdpsYP
#infrastructure #aiinvestments #aiagents
Guide to Architect Secure AI Agents: Best Practices for Safety
Ready to become a certified watsonx Generative AI Engineer? Register now and use code IBMTechYT20 for 20% off of your exam → https://ibm.biz/BdpxYx
Learn more about Architecting Secure AI Agents here → https://ibm.biz/BdpRmS
Learn more about AI Agent Security here → https://ibm.biz/BdpB3V
AI agents are powerful but risky. 🤖 Jeff Crume shares a step-by-step guide to architecting secure AI agents using governance, RBAC, and DevSecOps principles. Discover how to mitigate risks like prompt injection attacks and data leaks while ensuring reliability and compliance. 🔒
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdpB3J
#aiagents #aiarchitecture #secureai
Romance scams: How they work, how they win and what we do about it
Explore the podcast → https://ibm.biz/BdprRb
Valentine’s day might be over, but love is in the air.
The love a scammer has for their victim’s wallet, that is.
In this special episode of Security Intelligence, host Matt Kosinski sits down with Claire Nunez, Suja Viswesan, and Dave Bales to break down how modern romance scams actually work: from the “wrong number” text that starts an innocent chat, to long-con “pig butchering” schemes that use emotion, trust and time to extract money — often through crypto investment bait.
The panel explains why anyone can fall for these scams, how breaches and public records can help scammers build convincing victim profiles and how AI is making the problem worse.
Finally, the team gets practical: how to talk to a loved one who may be caught in a scam, how to remove stigma so people report faster and what organizations can do when a “personal” scam becomes a corporate risk.
Key takeaways: Don’t respond to unknown numbers, treat online “investment opportunities” as a red flag and remember: if this happened to you, you’re not alone.
00:00 - Intro
01:29 - Anatomy of romance scam
22:39 - Disrupting the scam
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Subscribe to the IBM Think newsletter → https://ibm.biz/BdprRV
#romancescam #socialengineering #textscam
You Asked About AI: Agents, Hacking & LLMs
Today we’re diving headfirst into the wild world of AI — and answering your questions from the comments! David Levy explores AI agents, machine learning workflows, cybersecurity challenges, and the growing world of local LLMs. Tell us what you want covered next below🚀
0:00 - Intro
0:28 - Can AI Find Me Love?
1:40 - How Does AI Change The Landscape of Hacking?
3:50 - What models do you use for creative text generation?
5:18 - Can Machine learning be done locally?
6:41 - Is Ollama a good choice for a production environment?
7:41 - What the difference MCP vs A2A?
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdpH4T
Still haven't subscribed to IBM Technology on YouTube? → https://ibm.biz/BdpHrY
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
#aiagents #machinelearning #cybersecurity #llms
Error 400: API key not valid. Please pass a valid API key..
Domain code: global
Reason code: badRequest
